Can you share a bit more about your setup? For example, where does Vault run in relation to your Kubernetes cluster(s)? Do you run multiple clusters? Multiple instances of Vault?
Using HCP Vault, therefore Vault is not running in that Kubernetes cluster. Currently there is only one cluster.
So “Use local token as reviewer JWT” is not an option ( terminology from Kubernetes - Auth Methods | Vault | HashiCorp Developer )
Would also like to avoid “Use long-lived token as reviewer JWT”
Update: As you are using HCP Vault, you are correct in that you cannot use the “local service account token” as it requires Vault to be deployed on the Kubernetes cluster.
You should be able to use a custom audience when configuring the Kubernetes auth method for: “Use local service account token as the reviewer JWT”.
I recently built a GitHub repo with various Kubernetes Auth method examples (in Terraform). In my example I was able to set audience: vault.
However, I did have trouble setting a custom audience with: “Use the Vault client’s JWT as the reviewer JWT”. When configuring this option, the audience must be equal/contain the Kubernetes issuer URL.