Hashicorp

How to use Vagrant with VMWare vCenter

Vagrant is a tool made by Hashicorp for provisioning and de-provisioning virtual machines and groups of virtual machines. Frequently Vagrant is used for brining up test machines on your local computer. But, sometimes you want to run your virtual machines in your data center. In this article, I will describe how to use Vagrant with VMware VCenter to provision and de-provision virtual machines running in your data center. As you are running through this article, you will need to download various files. Read more […]

Read More

padlock

Managing Vault Tokens – Hashicorp Vault

The default authentication method in Vault is Tokens.  Anytime you authenticate, regardless of the method, vault is creating a token, storing it somewhere, then using it for future interactions.  This article will discuss the process for managing your vault tokens using the vault CLI Authentication using a token When you first install Vault, you will be given a default root token.  You can use this token to authenticate using the vault auth command:

Example: Read more […]


door lock

Hashicorp Vault – Creating a new root Token

The best practices for Hashicorp Vault are to destroy your default root token after you have finished the initial setup of Vault. However, you will still find times when you need a new root token for certain advanced functions.This article describes how to create a new root token using your vault unseal keys.Instructions were found here: https://www.hashicorp.com/blog/vault-0-5/Generate One time Password:First we will use the vault generate-root command with the genopt argument. This will generate Read more […]


lock

Hashicorp Vault – Configure Authentification

There are many authentication methods for vault. This article descibes how to configure LDAP authentication and Userpass Authentication LDAP Authentication: The following command will configure LDAP to point at a domain controller named mydomaincontroller.mydomain.com. It will then search the search base for groups to the top of mydomain.com domain: vault write auth/ldap/config url=”ldap://mydomaincontroller.mydomain.com:389″ userattr=sAMAccountName userdn=“dc=mydomain,dc=com” groupdn=“dc=mydomain,dc=com” Read more […]


padlock

Hashicorp Vault – Rekey or Unseal Vault

After the Hashicorp Vault service has been restarted, the password vault is in a sealed state. This means that the encryption keys are not in memory, and the encrypted database on the disk cannot be read. More on this topic can be read here: https://www.vaultproject.io/docs/concepts/seal.htmlThis article will discuss the process for unsealing and re-keying the vault.To unseal the vaultGenerally to unseal the vault you will need at least two unseal keys. Whoever created the vault, or last re-keyed Read more […]


padlock green door chain

Hashicorp Vault – Reading and Writing Secrets to Vault

This article will describe how to read and write secrets to vault using the vault CLI and CURL. These instructions are assuming you are on either Linux or Mac OSX. Later we will add instructions for windows. That said, most of the Vault CLI commands should work fine on windows as well.Before you can proceed, you need to be sure you have authenticated against vault. For details on that, you can check out one of our articles about configuring vault authentication. To use the CURL commands you also Read more […]


chain

Hashicorp Vault – Install Client CLI and GUI

Hashicorp Vault has a variety of ways to access it. You can access it via a CLI client, via the rest api/CURL, and via a third party GUI client. This article will discuss how to setup the CLI and one of the 3rd party GUI’s available on Github.Installing the CLI ClientVault has a client for a variety of platforms. Lets start by downloading the appropriate client for your platform from here:https://www.vaultproject.io/downloads.htmlOSX/MacOS:The installation on OSX/MacOS is very easy. There are Read more […]