charm-vault/src
Zuul b67c0acee0 Merge "Add bionic support" 2018-04-18 08:04:46 +00:00
..
files/nagios Restructure charm to follow src dir format 2018-02-19 10:19:09 +00:00
reactive Merge "Add bionic support" 2018-04-18 08:04:46 +00:00
templates Add support for HA deployments using etcd 2018-04-16 14:37:00 +00:00
tests Merge "Add bionic support" 2018-04-18 08:04:46 +00:00
README.md Add bionic support 2018-04-17 07:45:20 +00:00
config.yaml Add ssl-ca configuration option 2018-04-12 17:14:59 +01:00
copyright Restructure charm to follow src dir format 2018-02-19 10:19:09 +00:00
layer.yaml Add support for HA deployments using etcd 2018-04-16 14:37:00 +00:00
metadata.yaml Merge "Add bionic support" 2018-04-18 08:04:46 +00:00
test-requirements.txt Add functional tests 2018-04-12 11:20:16 +00:00
tox.ini Add support for MySQL 2018-04-12 17:13:20 +00:00
wheelhouse.txt Add support for HA deployments using etcd 2018-04-16 14:37:00 +00:00

README.md

Overview

Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.

About the Charm

This charm installs Vault from the Ubuntu Snap Store and supports the PostgreSQL and MySQL storage backends. Note that Vault itself does not support PostgreSQL 10, so neither does this charm. If you're deploying on bionic, you'll need to deploy a 9.x version of PostgreSQL.

After deploying and relating the charm to postgresql, install the vault snap locally and use "vault init" to create the master key shards and the root token, and store them safely.