Skip to content

Commit f443531

Browse files
authored
Merge pull request #358 from mbaldessari/insecurevault
Updated vault info
2 parents bdeb1ea + 03cd18c commit f443531

File tree

1 file changed

+9
-7
lines changed

1 file changed

+9
-7
lines changed

content/learn/vault.adoc

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,22 +14,24 @@ aliases: /secrets/vault/
1414
[id="prerequisites"]
1515
= Prerequisites
1616

17-
You have deployed/installed a validated pattern using the instructions provided for that pattern. This should include setting having logged into the cluster using `oc login` or setting you `KUBECONFIG` environment variable and running a `make install`.
17+
You have deployed/installed a validated pattern using the instructions provided for that pattern. This should include setting having logged into the cluster using `oc login` or setting you `KUBECONFIG` environment variable and running a `./pattern.sh make install`.
1818

1919
[id="setting-up-hashicorp-vault"]
2020
= Setting up HashiCorp Vault
2121

22-
Any validated pattern that uses HashiCorp Vault already has deployed Vault as part of the `make install`. To verify that Vault is installed you can first see that the `vault` project exists and then select the Workloads/Pods:
22+
Any validated pattern that uses HashiCorp Vault already has deployed Vault as part of the `./pattern.sh make install`. To verify that Vault is installed you can first see that the `vault` project exists and then select the Workloads/Pods:
2323

2424
image:/images/secrets/vault-pods.png[link="/images/secrets/vault-pods.png"]
2525

26-
In order to setup HashiCorp Vault there are two different ways, both of which happen automatically as part of the `make install` command:
26+
The setup for HashiCorp Vault happens automatically as part of the `./pattern.sh make install` command.
27+
A cronjob will run every five minutes inside the `imperative` namespace and unseal, initialize and configure the vault. The vault's unseal keys and root token will be stored inside a secret called `vaultkeys` in the `imperative` namespace.
2728

28-
. Inside the cluster directly when the helm value `clusterGroup.insecureUnsealVaultInsideCluster` is set to `true`. With this method a cronjob will run every five minutes inside the `imperative` namespace and unseal, initialize and configure the vault. The vault's unseal keys and root token will be stored inside a secret called `vaultkeys` in the `imperative` namespace. *It is considered best practice* to copy the content of that secret offline, store it securely and then delete it.
29-
. On the user's computer when the helm value `clusterGroup.insecureUnsealVaultInsideCluster` is set to `false`. This will store the json containing containing both vault root token and unseal keys inside a file called `common/pattern-vault.init`. It is recommended to encrypt this file or store it securely.
30-
31-
An example output is the following:
29+
[NOTE]
30+
====
31+
It is recommended that you copy the contents of that secret offline, store it securely, and then delete it. It will not be recreated after the vault is unsealed.
32+
====
3233

34+
An example output from running the `oc extract -n imperative secret/vaultkeys --to=- --keys=vault_data_json 2>/dev/null` command:
3335
[source,json]
3436
----
3537
{

0 commit comments

Comments
 (0)