Skip to content
Merged
Changes from all commits
Commits
Show all changes
89 commits
Select commit Hold shift + click to select a range
0a147b4
Adding +x to script, typos and remove verrazzano file
andytael Apr 14, 2022
ce0eaeb
Merge branch 'oracle:main' into main
andytael Apr 14, 2022
3e391d2
Merge remote-tracking branch 'upstream/main'
andytael Apr 14, 2022
7bb9c03
Merge branch 'main' of https://github.com/andytael/microservices-data…
andytael Apr 14, 2022
a3c4bdd
Merge branch 'oracle:main' into main
andytael Apr 21, 2022
6bf4200
Repo updates for OL
andytael May 2, 2022
d9c6790
Typo in Dockerfile
andytael May 2, 2022
724fa86
Merge branch 'oracle:main' into main
andytael May 9, 2022
f4267a0
Upgrading OKE and nodepool version to latest
andytael Jun 3, 2022
f0fcc3c
Merge branch 'oracle:main' into main
andytael Jun 3, 2022
cd79e4d
Merge branch 'oracle:main' into main
andytael Jun 4, 2022
0d9ea44
Merge branch 'oracle:main' into main
andytael Jun 22, 2022
a36e150
Merge branch 'oracle:main' into main
andytael Jul 7, 2022
2815ea6
Updated README.md
andytael Jul 7, 2022
00fc6da
Merge branch 'main' of https://github.com/andytael/microservices-data…
andytael Jul 7, 2022
7bc25c5
Merge branch 'oracle:main' into main
andytael Jul 7, 2022
cf6b1f1
Merge branch 'main' of https://github.com/andytael/microservices-data…
andytael Jul 25, 2022
1aba4b1
Initial check-in of sec workshop (#456)
andytael Jul 28, 2022
17f102c
Initial check in of Security Workshop (WMS8461)
andytael Jul 28, 2022
8a1e11c
Initial check in of Security Workshop (WMS8461)
andytael Jul 28, 2022
6b54e4e
Merge branch 'oracle:main' into main
andytael Jul 29, 2022
fe639ba
Merge branch 'main' of https://github.com/andytael/microservices-data…
andytael Sep 2, 2022
4da5d6b
Merge branch 'main' of https://github.com/andytael/microservices-data…
andytael Sep 2, 2022
5027741
Merge branch 'oracle:main' into main
andytael Oct 6, 2022
6338ce8
Merge branch 'oracle:main' into main
andytael Oct 7, 2022
36122c8
Merge branch 'oracle:main' into main
andytael Oct 13, 2022
7dba56b
Merge branch 'oracle:main' into main
andytael Oct 14, 2022
8866d92
Merge branch 'oracle:main' into main
andytael Oct 17, 2022
bc2e5aa
Merge branch 'oracle:main' into main
andytael Dec 21, 2022
d433cd8
CLI Setup changes
andytael Dec 21, 2022
12504d2
Merge branch 'oracle:main' into main
andytael Dec 21, 2022
469cafb
Sample app Doc Update
andytael Dec 21, 2022
ba66815
Doc and SQL script updates
andytael Dec 21, 2022
431bfcb
Created separate doc for the CLI stuff
andytael Dec 21, 2022
af2e7cc
cli doc changes
andytael Dec 21, 2022
29d8c18
Removing CLI stuff
andytael Dec 21, 2022
b6c4f8e
Merge branch 'oracle:main' into main
andytael Dec 21, 2022
6793249
Merge branch 'oracle:main' into main
andytael Dec 22, 2022
5a15a25
Merge branch 'oracle:main' into main
andytael Jan 4, 2023
5e7f64a
Merge branch 'oracle:main' into main
andytael Jan 6, 2023
5c70f2c
Merge branch 'oracle:main' into main
andytael Jan 10, 2023
3504d3c
Merge branch 'oracle:main' into main
andytael Jan 11, 2023
15354e6
Merge branch 'oracle:main' into main
andytael Jan 12, 2023
b815937
Merge branch 'oracle:main' into main
andytael Jan 13, 2023
acc7f34
Doc updates
andytael Jan 19, 2023
d0754ad
Merge branch 'oracle:main' into main
andytael Jan 24, 2023
95462c3
Merge branch 'oracle:main' into main
andytael Jan 25, 2023
24f4ee2
Merge branch 'oracle:main' into main
andytael Jan 25, 2023
58a50e8
Merge branch 'oracle:main' into main
andytael Jan 26, 2023
a736744
Doc bugs and Vault Documentation
andytael Jan 26, 2023
8628800
Doc bugs and Vault docs
andytael Jan 26, 2023
38103fd
Vault Doc Updates
andytael Jan 26, 2023
5a8e6a4
Setup doc fixes
andytael Jan 26, 2023
8260653
Spell checking
andytael Jan 26, 2023
39f463a
Vault doc updates
andytael Jan 27, 2023
ab0ef30
Doc updates per Mark findings
andytael Jan 27, 2023
1cc6d50
Merge branch 'oracle:main' into main
andytael Jan 27, 2023
d7b7795
Fix for k8s version and TF deprecated attr
andytael Jan 27, 2023
0f25c4c
Merge branch 'oracle:main' into main
andytael Jan 27, 2023
0b02028
Removed ssl_server_cert_dn from DBLINK
andytael Jan 27, 2023
e91bb96
Remove _SSL_SERVER_CERT_DN vars
andytael Jan 27, 2023
4aea41f
Adding back DB1_SSL_SERVER_CERT_DN
andytael Jan 30, 2023
caea119
Vault doc updates
andytael Jan 30, 2023
3316df3
Vault doc updates
andytael Jan 30, 2023
98e4481
Setup and Vault changes
andytael Jan 30, 2023
8d049f3
Typos
andytael Jan 30, 2023
1ee89c4
Added HashiCorp
andytael Jan 30, 2023
6227f4a
Merge branch 'oracle:main' into main
andytael Jan 31, 2023
0ace120
Setup doc updates
andytael Jan 31, 2023
e649317
Adding .gitignore for Hugo files
andytael Jan 31, 2023
0cd22a3
Merge branch 'oracle:main' into main
andytael Jan 31, 2023
7346a34
Rollback SSL_SERVER_CERT changes
andytael Feb 1, 2023
db75b67
Merge branch 'oracle:main' into main
andytael Feb 1, 2023
f9b72de
Merge branch 'oracle:main' into main
andytael Feb 6, 2023
ab11dbb
Merge branch 'oracle:main' into main
andytael Feb 10, 2023
2a6215b
Merge branch 'oracle:main' into main
andytael Feb 10, 2023
080da62
Merge branch 'oracle:main' into main
andytael Feb 10, 2023
fb1e13b
Vault doc updates
andytael Feb 15, 2023
3f36736
Merge branch 'oracle:main' into main
andytael Feb 15, 2023
ca31b47
PR fixes
andytael Feb 15, 2023
b6b2867
Merge branch 'oracle:main' into main
andytael Feb 15, 2023
51d6b4b
Merge branch 'oracle:main' into main
andytael Feb 27, 2023
c70fdb0
Merge branch 'oracle:main' into main
andytael Mar 6, 2023
d0c8c8c
Merge branch 'oracle:main' into main
andytael Mar 7, 2023
bfc6111
Merge branch 'oracle:main' into main
andytael Mar 8, 2023
287b56e
Merge branch 'oracle:main' into main
andytael Mar 9, 2023
32eea83
Bugfixes
andytael Mar 13, 2023
dc74bad
Merge branch 'oracle:main' into main
andytael Mar 13, 2023
7ac453c
Vault doc update
andytael Mar 13, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
42 changes: 32 additions & 10 deletions docs-source/spring/content/platform/vault/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,9 +39,12 @@ The Vault is [unsealed](https://developer.hashicorp.com/vault/docs/configuration

The following Vault services are enabled during deployment. Other services can be enabled using the `vault` command and the Web User Interface.

- [Token Auth Method](https://developer.hashicorp.com/vault/docs/auth/token). The token auth method is built-in and automatically available. It allows users to authenticate using a token, as well to create new tokens, revoke secrets by token, and more.
- [Token Auth Method](https://developer.hashicorp.com/vault/docs/auth/token). The `token` auth method is built-in and automatically available. It allows users to authenticate using a token, as well to create new tokens, revoke secrets by token, and more.
- [AppRole Auth Method](https://developer.hashicorp.com/vault/docs/auth/approle). The `approle` auth method allows machines or apps to authenticate with Vault-defined roles.
- [Kubernetes Auth Method](https://developer.hashicorp.com/vault/docs/auth/kubernetes). The `kubernetes` auth method can be used to authenticate with Vault using a Kubernetes Service Account Token. This method of authentication makes it easy to introduce a Vault token into a Kubernetes Pod.
- [Userpass Auth Method](https://developer.hashicorp.com/vault/docs/auth/userpass)The `userpass` auth method allows users to authenticate with Vault using a username and password combination.
- [KV Secrets Engine Version 2](https://developer.hashicorp.com/vault/docs/secrets/kv). The kv secrets engine is a generic Key-Value store used to store arbitrary secrets.
- [AppRole Auth Method](https://developer.hashicorp.com/vault/docs/auth/approle). The approle auth method allows machines or apps to authenticate with Vault-defined roles.


## Accessing Vault using using kubectl

Expand Down Expand Up @@ -81,7 +84,7 @@ The following Vault services are enabled during deployment. Other services can b
To interact with vault you need to login using a token. The root token is stored in a k8s secret. Get the token by running this command, the output is the root token. It is **VERY IMPORTANT** that the token is saved in multiple places, loosing the token can result in loss of access to the Vault.

```shell
kubectl get secret root-token -n vault --template="{{index .data \"root.token\" | base64decode}}"
kubectl get secret vault-root-token -n vault --template="{{index .data \"root.token\" | base64decode}}"
```

Login to the vault:
Expand Down Expand Up @@ -124,7 +127,26 @@ The following Vault services are enabled during deployment. Other services can b
sys/ system system_df5c39a8 system endpoints used for control, policy and debugging
```

5. Create a secret
5. Display the authentication methods enabled:

To display the enabled authentication methods execute the following command:

```shell
kubectl exec pod/vault-0 -n vault -it -- vault auth list
```

The output will look similar to this:

```text
Path Type Accessor Description
---- ---- -------- -----------
approle/ approle auth_approle_00ffb93b n/a
kubernetes/ kubernetes auth_kubernetes_c9bb0698 n/a
token/ token auth_token_68b0beb2 token based credentials
userpass/ userpass auth_userpass_afb2fb02 n/a
```

6. Create a secret

Create a secret at path `kv-v2/customer/acme` with a `nme` and an `email`

Expand All @@ -148,7 +170,7 @@ The following Vault services are enabled during deployment. Other services can b
version 1
```

6. Get a secret
7. Get a secret

Get the created secret:

Expand Down Expand Up @@ -243,13 +265,13 @@ Vault is configured to Auto Unseal using OCI Vault. Initializing with Auto Unsea
To extract the five recovery keys use the following commands:

``` shell
% kubectl get secret recovery-keys -n vault --template="{{index .data \"recovery.key.1\" }}"
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.1\" }}"

% kubectl get secret recovery-keys -n vault --template="{{index .data \"recovery.key.2\" }}"
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.2\" }}"

% kubectl get secret recovery-keys -n vault --template="{{index .data \"recovery.key.3\" }}"
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.3\" }}"

% kubectl get secret recovery-keys -n vault --template="{{index .data \"recovery.key.4\" }}"
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.4\" }}"

% kubectl get secret recovery-keys -n vault --template="{{index .data \"recovery.key.5\" }}"
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.5\" }}"
```