Prototype of auto unsealing Vault with dynamic database creds on K8s
-
Updated
Dec 10, 2018 - Shell
Prototype of auto unsealing Vault with dynamic database creds on K8s
Framework for backend-agnostic secrets access
This role creates a hashicorp vault cluster secured by another vault.
A simple vault server with a more prod-like configuration than the -dev server.
vault plugin that enables authentication and policy bounding via google accounts and groups
Example of Vault resources definition as a code with Terraform
Code for Spring Miroservices
create a ec2 instance with terraform+vault
A demo showing how to access secrets stored in Hashicorp vault from a Golang application
A guide to deploying HashiCorp Vault to Oracle Container Engine for Kubernetes (OKE). Vault is deployed in HA mode with the Kubernetes auth method configured. Note: This project is a mirror of the upstream GitLab project developed and maintained by Cameron Senese.
Demo application for utilising Hashicorp Vault for encryption.
Terraform Module for deploying Vault on AWS ECS
Spring cloud vault can manage static and dynamic secrets such as username/password for remote applications/resources and provide credentials for external services such as MySQL, PostgreSQL, Apache Cassandra, MongoDB, Consul, AWS, etc.
Go package to automatically create and refresh tls.Config certificates using Hashicorp Vault PKI backend
A simple deployment and demonstration of hashicorp vault in kubernetes with helm
Cloud agnostic Ansible playbooks used to deploy vault cluster backed by raft storage engine in HA mode.Mainly used for setting up disposable clusters backed by LXC containers inside a Vagrant box.
Backup Hashicorp Vault Raft Storage using PowerShell
Add a description, image, and links to the hashicorp-vault topic page so that developers can more easily learn about it.
To associate your repository with the hashicorp-vault topic, visit your repo's landing page and select "manage topics."