Juju Charm - Vault secrets managment
Go to file
Liam Young 4ed39ef03e Fix lint 2018-02-03 08:59:19 +00:00
files/nagios Fix lint 2018-02-03 08:59:19 +00:00
reactive Fix lint 2018-02-03 08:59:19 +00:00
templates add SSL support 2017-05-12 14:28:49 +12:00
unit_tests Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
.gitignore Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
.stestr.conf Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
README.md add copyright, and some information about vault 2017-06-29 09:31:13 +12:00
config.yaml empty default value for nagios_servicegroups and fix description 2017-05-30 14:21:21 +12:00
copyright add copyright, and some information about vault 2017-06-29 09:31:13 +12:00
layer.yaml deploy a simple service check 2017-05-26 12:00:49 +12:00
metadata.yaml set series to xenial 2017-06-29 09:59:49 +12:00
requirements.txt Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
test-requirements.txt Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
tox.ini Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00

README.md

Overview

Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.

About the Charm

This charm installs Vault from the Ubuntu Snap Store and supports the PostgreSQL storage backend only.

After deploying and relating the charm to postgresql, install the vault snap locally and use "vault init" to create the master key shards and the root token, and store them safely.