Skip to content

Instantly share code, notes, and snippets.

View jjenkins70's full-sized avatar

Jeremiah jjenkins70

View GitHub Profile

curl --header "X-Vault-Token: ${TOKEN}" http://192.168.7.70:8200/v1/sys/license | jq '.'

Steps for setting up Vault/Consul

Consul Server

  • Use vagrant scripts to get vault and consul instances stood up.

  • Consul Server

@jjenkins70
jjenkins70 / README.md
Created January 23, 2020 19:29
HashiCorp Vault TLS Certificate Auth Samples

Simple Vault TLS Certificate validation & testing

Set of scripts to deploy locally, vault and configure TLS server and user certificates for testing TLS AUTH.

credit to @reard3n (https://github.com/reard3n) and @v6 (https://github.com/v6) for the gist this grew from

Notes

This was tested using Vagrant and Ubuntu

Getting Setup

  • On the OS of your choice copy VaultCASetup.sh script locally and update any variables that would be specific to your environment and/or
@jjenkins70
jjenkins70 / README.md
Last active September 27, 2019 14:52
Vault Transit Secrets Example.

vault server --dev --dev-root-token-id="root" PreReq: export VAULT_ADDR=http://127.0.0.1:8200/ export VAULT_TOKEN=root

# Enable transit secrets engine
path "sys/mounts/transit" {
  capabilities = [ "create", "read", "update", "delete", "list" ]
}

Keybase proof

I hereby claim:

  • I am jjenkins70 on github.
  • I am jjenkins70 (https://keybase.io/jjenkins70) on keybase.
  • I have a public key ASBqXftlkOODgf5WU17nYfn-atDPJaVn3GkL4SZJCQXKfwo

To claim this, I am signing this object: