HashiCorp Vault Deploy Vault, HTTP API & UI - Part 8 | HashiCorp Vault tutorial series

Поделиться
HTML-код
  • Опубликовано: 28 авг 2024
  • To learn more on DevOps visit - jhooq.com/
    Part 1 (HashiCorp Vault Installation) - • HashiCorp Vault Instal...
    Part 2 (HashiCorp Vault Start and Stop in Development mode) - • HashiCorp Vault Start ...
    Part 3 (HashiCorp Vault Read Write and Delete secrets) - • HashiCorp Vault Read W...
    Part 4 (HashiCorp Vault Secret Engine and Secret Engine path) - • HashiCorp Vault Secret...
    Part 5 (HashiCorp Vault Dynamic Secrets generation) - • HashiCorp Vault Dynami...
    Part 6 (HashiCorp Vault Token Authentication & GitHub Authentication) - • HashiCorp Vault Token ...
    Part 7 (HashiCorp Vault Policy) - • HashiCorp Vault Policy...
    Part 8 (HashiCorp Vault Deploy Vault, HTTP API & UI ) - • HashiCorp Vault Deploy...
    HashiCorp vault is a tool for managing encryption and secrets. This is a HashiCorp tutorial series where we will start from the very basic HashiCorp installation and will go all the way by running the vault in production mode.
    In this session we are gonna take look on Deployment of Vault along with UI as well as HTTP API. Here are the list of topic we are gonna cover -
    1. How to deploy vault in production
    2. Create config.hcl for vault's storage, listner, api_address, cluster and UI
    3. Starting the Vault server with server config
    4. What are seal and unseal tokens
    5. How to access the UI of vault
    6. Rest HTTP API of vault from command line interface
    ▬▬▬▬▬▬ ⭐️ Dynamic Secrets generation commands ⭐️ ▬▬▬▬▬▬
    1. Unset development token
    $ unset VAULT_TOKEN
    2. Vault's config.hcl
    storage "raft" {
    path = "./vault/data"
    node_id = "node1"
    }
    listener "tcp" {
    address = "127.0.0.1:8200"
    tls_disable = "true"
    }
    api_addr = "127.0.0.1:8200"
    cluster_addr = "127.0.0.1:8201"
    ui = true
    3. Create "RAFT" storage backend directory
    $ mkdir -p ./vault/data
    4. Starting vault server using config.hcl
    $ vault server -config=config.hcl
    5. Export VAULT_ADDR
    $ export VAULT_ADDR='127.0.0.1:8200'
    6. Initialize vault
    $ vault operator init
    7. Unseal vault
    $ vault operator unseal
    ▬▬▬▬▬▬ ⭐️ Follow me ⭐️ ▬▬▬▬▬▬
    Instagram - / wagh.rahul17
    Twitter - / wagh_rahul
    To learn more on DevOps visit - jhooq.com/
    Disclaimer/Policy: All the content/instructions are solely mine. The source is completely open-source.
    Video is copyrighted and can not be re-distributed on any platform.

Комментарии • 40

  • @satyam_code
    @satyam_code Месяц назад +1

    💛💙

  • @ChandanThakur9
    @ChandanThakur9 Год назад +1

    well explained !! Thanks for videos
    May God Bless You And Your Family.

  • @satyam_code
    @satyam_code Месяц назад

    ❤💙

  • @msowrirajan
    @msowrirajan 7 месяцев назад

    Great Effort!, Simple and clear explanation.

    • @RahulWagh
      @RahulWagh  7 месяцев назад

      Glad you liked it

  • @keshavpisal6777
    @keshavpisal6777 Год назад +1

    Very useful content and also brillient explanation 👍

    • @RahulWagh
      @RahulWagh  Год назад

      Thank you for liking the content

  • @souravmukherjee5334
    @souravmukherjee5334 4 месяца назад

    Excellent Series Rahul, Looking for your AWS+ Terraform+ Vault Project. Kudos..

    • @RahulWagh
      @RahulWagh  4 месяца назад +1

      Surely I will add it to my list of todo

  • @zaheerhussain5311
    @zaheerhussain5311 28 дней назад

    Hi
    Very nice videos' overall. I would appreciate if you can share video on setup vault auto-seal with Transit Secret Engine.
    Regards

  • @pramodsakhare5469
    @pramodsakhare5469 Год назад

    Awesome content Rahul. Waiting for terraform+AWS/azure+ hashicorp vault. When is it coming?

  • @nikhilnanekar6745
    @nikhilnanekar6745 Год назад

    Eagerly waiting for terraform+AWS/azure+ hashicorp vault

  • @manishc4531
    @manishc4531 7 месяцев назад

    Thanks for the informative session. Don't we have to export the vault_token as we did in dev mode?

  • @sripalxilinx
    @sripalxilinx Год назад +1

    Eagerly waiting for this 🎉

    • @RahulWagh
      @RahulWagh  Год назад

      It will be available today stay tuned

    • @teklavya
      @teklavya Год назад +1

      @@RahulWagh Still waiting for the session on AWS+Terraform+Vault

  • @gokhanyildirim4162
    @gokhanyildirim4162 6 месяцев назад

    Great explanations. Thank you :)

    • @RahulWagh
      @RahulWagh  6 месяцев назад

      Glad it was helpful!

  • @user-fm8re4tj1e
    @user-fm8re4tj1e Год назад

    you are great

  • @user-tz4cu9nn2v
    @user-tz4cu9nn2v 5 месяцев назад

    Hi Rahul, informative video but enable to find terraform+AWS +vault Part9 video which you mentioned in the video at the end for dynamic secrets, when its coming?

    • @RahulWagh
      @RahulWagh  5 месяцев назад

      I will see when I have time to prepare around it

  • @aniruddhakulkarni3663
    @aniruddhakulkarni3663 10 месяцев назад

    I wanted to assign a particular token to the vault. When the vault starts, it should take a token that I am given. What do you think about this.

  • @Naruse-il3sb
    @Naruse-il3sb 10 месяцев назад

    whats the recommended infrastructure in aws to host hashicorp for prod? Do I start with t2.micro?

  • @Santoshnagargoje007
    @Santoshnagargoje007 Год назад

    @Rahul I am looking for Vault Associate Certification does this series and topics arranged as per the terraform cerfication path

    • @RahulWagh
      @RahulWagh  Год назад

      Hi the series is as per the hashicorp documentation so it will definitely help you for your certification

  • @shyamjithsa9928
    @shyamjithsa9928 11 месяцев назад

    Could you please explain or create a video on how to run the vault on background mode

    • @user-tz4cu9nn2v
      @user-tz4cu9nn2v 5 месяцев назад

      I believe we have to use system.d file for vault

  • @jalandharbehera2456
    @jalandharbehera2456 Год назад

    Hi Sir.....how to enable UI for Vault using helm chart so please give any github account repo or please give me any suggestion 🙏🙏

    • @vempasiddhartha
      @vempasiddhartha Год назад

      @Jalandhar In helm chart values.yaml file there is a ui section. There you have to set enabled: true

  • @baqri14
    @baqri14 8 месяцев назад

    how to integrate the vault with the contabo server?

    • @RahulWagh
      @RahulWagh  8 месяцев назад

      Unfortunately I have not worked with contabo server

    • @baqri14
      @baqri14 8 месяцев назад

      @@RahulWagh Thanks for the reply. Can you guide me if I need to access my server for this I want to configure the vault in order to place the role base access. How can I do this?

    • @premierde
      @premierde 6 месяцев назад

      ​@@RahulWaghHow to integrate with gitlab

  • @sbito_007
    @sbito_007 Год назад

    Hello, @Rahul can you please explain how we can setup vault with nginx as reverse proxy...anyone knows it please let me know...thank you

    • @RahulWagh
      @RahulWagh  Год назад

      It is really hard explain the complete setup of nginx with hashi corp vault but here are my pointers which might help you. You need to setup and point the nginx to redirect on 127.0.0.1:8200. Offcourse you need to install nginx on the same server where you have installed Hashicorp vault

    • @sbito_007
      @sbito_007 Год назад

      @@RahulWagh Thank you for the reply, I have done the setup all we need is to make use of two paths here for vault(ui,v1) so for each location ui and v1 we can give proxy_pass well below config would work...
      location /vault/ {
      # access_log logs/vault_access.log main;
      # error_log logs/vault_error.log debug;
      proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
      proxy_set_header Host $host;
      proxy_http_version 1.1;
      proxy_set_header Upgrade $http_upgrade;
      proxy_set_header Accept-Encoding "";
      #to proxy WebSockets in nginx
      proxy_pass vault/;
      proxy_redirect /ui/ /vault/ui/;
      #proxy_redirect /v1/ /v1/sys/;
      #rewrite html baseurkl
      sub_filter '' '';
      #sub_filter_once on;
      sub_filter '"/ui/' '"ui/';
      sub_filter_once off;
      }
      location /v1/ {
      proxy_pass "vault/v1/";
      }

  • @Captain_ExorY
    @Captain_ExorY Месяц назад

    So you skipping the ssl part basically killing the Deploy purpose. Thanks for wrong Title.