Prototype of auto unsealing Vault with dynamic database creds on K8s
-
Updated
Dec 10, 2018 - Shell
Prototype of auto unsealing Vault with dynamic database creds on K8s
Framework for backend-agnostic secrets access
This role creates a hashicorp vault cluster secured by another vault.
A simple vault server with a more prod-like configuration than the -dev server.
vault plugin that enables authentication and policy bounding via google accounts and groups
Example of Vault resources definition as a code with Terraform
Code for Spring Miroservices
create a ec2 instance with terraform+vault
A demo showing how to access secrets stored in Hashicorp vault from a Golang application
A guide to deploying HashiCorp Vault to Oracle Container Engine for Kubernetes (OKE). Vault is deployed in HA mode with the Kubernetes auth method configured. Note: This project is a mirror of the upstream GitLab project developed and maintained by Cameron Senese.
Demo application for utilising Hashicorp Vault for encryption.
Terraform Module for deploying Vault on AWS ECS
Spring cloud vault can manage static and dynamic secrets such as username/password for remote applications/resources and provide credentials for external services such as MySQL, PostgreSQL, Apache Cassandra, MongoDB, Consul, AWS, etc.
Automated Cluster and Job Scaling For HashiCorp Nomad
Ansible role to deploy HashiCorp Vault with multiple backends, initialization and auto-unsealing support (initially forked)
loads configuration stored in .yaml files and adds them as secrets in Vault
Ansible Role: VAULT
Add a description, image, and links to the hashicorp-vault topic page so that developers can more easily learn about it.
To associate your repository with the hashicorp-vault topic, visit your repo's landing page and select "manage topics."