Prototype of auto unsealing Vault with dynamic database creds on K8s
-
Updated
Dec 10, 2018 - Shell
Prototype of auto unsealing Vault with dynamic database creds on K8s
Framework for backend-agnostic secrets access
This role creates a hashicorp vault cluster secured by another vault.
A simple vault server with a more prod-like configuration than the -dev server.
vault plugin that enables authentication and policy bounding via google accounts and groups
Example of Vault resources definition as a code with Terraform
Terraform Module for deploying Vault on AWS ECS
Spring cloud vault can manage static and dynamic secrets such as username/password for remote applications/resources and provide credentials for external services such as MySQL, PostgreSQL, Apache Cassandra, MongoDB, Consul, AWS, etc.
Code for Spring Miroservices
create a ec2 instance with terraform+vault
A demo showing how to access secrets stored in Hashicorp vault from a Golang application
A guide to deploying HashiCorp Vault to Oracle Container Engine for Kubernetes (OKE). Vault is deployed in HA mode with the Kubernetes auth method configured. Note: This project is a mirror of the upstream GitLab project developed and maintained by Cameron Senese.
Demo application for utilising Hashicorp Vault for encryption.
Easy to deploy Open Source Notification Service. E-mail, Push and Calls (Slack Integrations Coming Soon).
Demonstration of the use of HashiCorp Vault's Dynamic Credentials with MongoDB
Configuration for simple file-based Vault
Add a description, image, and links to the hashicorp-vault topic page so that developers can more easily learn about it.
To associate your repository with the hashicorp-vault topic, visit your repo's landing page and select "manage topics."