Prototype of auto unsealing Vault with dynamic database creds on K8s
-
Updated
Dec 10, 2018 - Shell
Prototype of auto unsealing Vault with dynamic database creds on K8s
Framework for backend-agnostic secrets access
This role creates a hashicorp vault cluster secured by another vault.
A simple vault server with a more prod-like configuration than the -dev server.
vault plugin that enables authentication and policy bounding via google accounts and groups
Example of Vault resources definition as a code with Terraform
Code for Spring Miroservices
create a ec2 instance with terraform+vault
A demo showing how to access secrets stored in Hashicorp vault from a Golang application
A guide to deploying HashiCorp Vault to Oracle Container Engine for Kubernetes (OKE). Vault is deployed in HA mode with the Kubernetes auth method configured. Note: This project is a mirror of the upstream GitLab project developed and maintained by Cameron Senese.
Demo application for utilising Hashicorp Vault for encryption.
Terraform Module for deploying Vault on AWS ECS
Spring cloud vault can manage static and dynamic secrets such as username/password for remote applications/resources and provide credentials for external services such as MySQL, PostgreSQL, Apache Cassandra, MongoDB, Consul, AWS, etc.
Demonstration of the use of HashiCorp Vault's Dynamic Credentials with MongoDB
Configuration for simple file-based Vault
Listens motion MQTT topics and sends messages to bot (ViberBot)
This Sentinel EGP policy will generate an HTTP callback when an event was captured.
Add a description, image, and links to the hashicorp-vault topic page so that developers can more easily learn about it.
To associate your repository with the hashicorp-vault topic, visit your repo's landing page and select "manage topics."