- Aug 18, 2023
-
-
Yura Shutkin authored
-
Yura Shutkin authored
-
Yura Shutkin authored
-
- Aug 15, 2023
-
-
Yura Shutkin authored
-
- Aug 14, 2023
-
-
Yura Shutkin authored
-
Yura Shutkin authored
-
- Nov 17, 2020
-
-
Yura Shutkin authored
-
Yura Shutkin authored
-
Yura Shutkin authored
Add hashi_vault example See merge request !2
-
Yura Shutkin authored
-
- May 25, 2020
-
-
Yura Shutkin authored
Vault pki See merge request !1
-
Yura Shutkin authored
* You can use custom certificate encoded in x509 or generate CA with Hashicorp Vault
-
- May 05, 2020
-
-
Yura Shutkin authored
-
Yura Shutkin authored
I still can't figure how to specify pgsql schema in template. I used {{schema}} and {{search_path}} but both seems empty in creation script. Tested creation of creds after root creds rotated. Probably I should test new role creation after rotate
-
Yura Shutkin authored
Update config, initial sql script, fix .env.example, add README and Makefile, move logging into proto, add capabilities * Update config so Vault will use specific pgsql schema and and creds with ha_locks table as well * Disable proxy_protocol so you can access vault directly without web proxy * Specify seal type just for removing annoying warning at vault start * Create new db, schema, role and hardening permissions on tables * PGSQL data will be stored in docker volume * Vault config will be mounted into docker not a directory. Be cause I did not found how prevent Vault init script to change rights on files inside configs directory * Makefile and README contains goals and descriptions for guide https://learn.hashicorp.com/vault/secrets-management/sm-dynamic-secrets * Payloads is still in WIP status and added for future
-
Yura Shutkin authored
This will not convert any message of vault logs into JSON, but docker logs will looks like ``` docker logs vault-dev-single_server_1 ==> Vault server configuration: Cgo: disabled Listener 1: tcp (addr: "192.168.9.2:8200", cluster address: "192.168.9.2:8201", max_request_duration: "1m30s", max_request_size: "33554432", tls: "disabled") Log Level: trace Mlock: supported: true, enabled: false Recovery Mode: false Storage: file Version: Vault v1.4.0 ==> Vault server started! Log data will stream in below: {"@level":"info","@message":"proxy environment","@timestamp":"2020-05-05T11:06:51.170431Z","http_proxy":"","https_proxy":"","no_proxy":""} {"@level":"warn","@message":"no `api_addr` value specified in config or in VAULT_API_ADDR; falling back to detection if possible, but this value should be manually set","@timestamp":"2020-05-05T11:06:5...
-
- Apr 13, 2020
-
-
Yura Shutkin authored
-
Yura Shutkin authored
-
- Apr 10, 2020
-
-
Yura Shutkin authored
Signed-off-by:
Shutkin Yura <shutkin.yurii@gmail.com>
-
- Apr 09, 2020
-
-
Yura Shutkin authored
Signed-off-by:
Shutkin Yura <shutkin.yurii@gmail.com>
-
- Apr 08, 2020
-
-
Yura Shutkin authored
-
Yura Shutkin authored
-
- Mar 04, 2020
-
-
Yura Shutkin authored
Signed-off-by:
Shutkin Yura <shutkin.yurii@gmail.com>
-
Yura Shutkin authored
Signed-off-by:
Shutkin Yura <shutkin.yurii@gmail.com>
-
Yura Shutkin authored
Signed-off-by:
Shutkin Yura <shutkin.yurii@gmail.com>
-
- Mar 02, 2020
-
-
Yura Shutkin authored
Signed-off-by:
Shutkin Yura <shutkin.yurii@gmail.com>
-
- Jan 28, 2020
-
-
Yura Shutkin authored
-
Yura Shutkin authored
Signed-off-by:
Shutkin Yura <shutkin.yurii@gmail.com>
-
- Dec 13, 2019
-
-
Yura Shutkin authored
Signed-off-by:
Shutkin Yura <shutkin.yurii@gmail.com>
-
- Dec 09, 2019
-
-
Yura Shutkin authored
Signed-off-by:
Shutkin Yura <shutkin.yurii@gmail.com>
-
- Sep 19, 2019
-
-
Yura Shutkin authored
-
Yura Shutkin authored
-
- Sep 17, 2019
-
-
Yura Shutkin authored
-
- Sep 11, 2019
-
-
Yura Shutkin authored
-
- Aug 28, 2019
-
-
Yura Shutkin authored
WIP vault unseal migrate searching for version with possibility of using shamir after transit seal type
-
- Aug 26, 2019
-
-
Yura Shutkin authored
-
- Aug 23, 2019
-
-
Yura Shutkin authored
-
Yura Shutkin authored
-
- Aug 22, 2019
-
-
Yura Shutkin authored
-
- Mar 29, 2019
-
-
Yura Shutkin authored
-