Size: 654
Comment:
|
← Revision 6 as of 2023-06-21 19:24:30 ⇥
Size: 957
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 10: | Line 10: |
# start in dev mode vault server -dev export VAULT_ADDR='http://127.0.0.1:8200' export VAULT_TOKEN=xyz vault status vault secrets list -detailed vault secrets list vault kv put secret/customer/acme customer_name="ACME Inc." contact_email="john.smith@acme.com" vault kv get secret/customer/acme |
Vault
Secure, store, and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets, and other sensitive data using a UI, CLI, or HTTP API.
1 wget -O- https://apt.releases.hashicorp.com/gpg | sudo gpg --dearmor -o /usr/share/keyrings/hashicorp-archive-keyring.gpg
2 echo "deb [signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/hashicorp.list
3 sudo apt update && sudo apt install vault
4 # start in dev mode
5 vault server -dev
6 export VAULT_ADDR='http://127.0.0.1:8200'
7 export VAULT_TOKEN=xyz
8 vault status
9 vault secrets list -detailed
10 vault secrets list
11 vault kv put secret/customer/acme customer_name="ACME Inc." contact_email="john.smith@acme.com"
12 vault kv get secret/customer/acme