Vault: Difference between revisions
Jump to navigation
Jump to search
| Line 162: | Line 162: | ||
!scope='col'| Policy | !scope='col'| Policy | ||
!scope='col'| Role | !scope='col'| Role | ||
|- | |||
|- | |- | ||
|valign='top'| | |valign='top'| | ||
| Line 172: | Line 173: | ||
} | } | ||
INI | INI | ||
vault policy read policy-shahed-ab-eso | vault policy read policy-shahed-ab-eso | ||
| Line 183: | Line 183: | ||
kubectl get --raw /.well-known/openid-configuration|yq -P .issuer | kubectl get --raw /.well-known/openid-configuration|yq -P .issuer | ||
vault write auth/kubernetes/role/role-shahed-ab-eso bound_service_account_names= | vault write auth/kubernetes/role/role-shahed-ab-eso bound_service_account_names=default \ | ||
bound_service_account_namespaces= | bound_service_account_namespaces=shahed-academia policies=policy-shahed-ab-eso \ | ||
audience='https://kubernetes.default.svc.cluster.local' ttl=24h | audience='https://kubernetes.default.svc.cluster.local' ttl=24h | ||
Revision as of 16:21, 23 January 2026
curl -fsSL https://apt.releases.hashicorp.com/gpg\
| sudo tee /etc/apt/keyrings/hashicorp.asc >/dev/null
DISTRIBUTION=$(. /etc/os-release && echo "${VERSION_CODENAME}")
cat << SRC | sudo tee /etc/apt/sources.list.d/hashicorp.list >/dev/null
deb [arch=$(dpkg --print-architecture)\
signed-by=/etc/apt/keyrings/hashicorp.asc]\
https://apt.releases.hashicorp.com ${DISTRIBUTION} main
SRC
|
cat <<'EXE' | sudo bash
apt-get update && apt-get install -y vault
systemctl disable --now vault.service
systemctl stop vault.service
systemctl mask vault.service
systemctl status vault.service
vault version
which vault
EXE
|
export VAULT_TOKEN='hvs.40aTe1S58DWIstRk4bHPgESg'
export VAULT_ADDR='https://vault.shahed.biz.ops'
vault status
|
export VAULT_SKIP_VERIFY=true
export VAULT_FORMAT=yaml
vault login
|
Auth
|
Auth | |||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
# Enabled userpass auth method
vault auth enable userpass
|
# Enabled kubernetes auth method
vault auth enable kubernetes
| ||||||||||||||||||||||
| |||||||||||||||||||||||
vault auth disable userpass
vault auth list
|
vault auth disable k8s/shahed/ab
vault auth disable kubernetes
| ||||||||||||||||||||||
Engine » KV
|
Engine » KV | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||||||||||||||||||||||
Engine » DB
|
Engine » DB | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
# Enabled the database secrets engine
vault secrets enable database
|
|||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||
Token » Init
|
Token » Init | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
Playground
|
Playground | |
|---|---|
echo "$(cat /dev/urandom|tr -dc 'A-Za-z0-9'|head -c 40)"
echo "$(cat /dev/urandom|tr -dc 'A-Za-z0-9'|head -c 20)"
echo "$(cat /dev/urandom|tr -dc 'A-Za-z0-9'|head -c 16)"
echo "$(cat /dev/urandom|tr -dc 'A-Za-z0-9'|head -c 8)"
|
vault auth list
vault audit list
vault policy list
vault secrets list
|
vault operator init -key-shares=5 -key-threshold=3
vault token lookup
vault status
|
vault operator unseal '/bvRmLPLF8MnfOQQWrhdqAmLBSKfNtSSkcyWY/uXZ0+F'
vault operator unseal 'Jh5mA+DwX/zlU+3jvxlgNarSzAOBRHvNcF3QOoGtzl/h'
vault operator unseal 'DqUWoe6MN6oDKi3bYoZuXSbT0ZpT0/Pbg0kpTkhkUfVP'
|
# self destructive or dangerous
vault token revoke -self
|
|
References
|
References | ||
|---|---|---|