6f043bb7ca
Switch max-lease-ttl -> max_lease_ttl inline with Vault API docs to ensure that certs can be issued for more than 30 days. Existing deployments with PKI enabled will be re-tuned to set max_lease_ttl to 10 years, correcting any existing PKI enablement. Certificates must be re-issued to use the TTL as provided during upload of the signed CSR for an Intermediate certificate. For deploys using the internally signed Root CA, the root CA must be re-generated using the 'disable-pki' and 'generate-root-ca' actions. Change-Id: I6a771090e320404c605d2170c7915c3c22a3ea2c Closes-Bug: 1788945 |
||
---|---|---|
.. | ||
actions | ||
files/nagios | ||
lib/charm | ||
reactive | ||
templates | ||
tests | ||
README.md | ||
actions.yaml | ||
config.yaml | ||
copyright | ||
icon.svg | ||
layer.yaml | ||
metadata.yaml | ||
test-requirements.txt | ||
tox.ini | ||
wheelhouse.txt |
README.md
Overview
Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.
About the Charm
This charm installs Vault from the Ubuntu Snap Store and supports the PostgreSQL and MySQL storage backends. Note that Vault itself does not support PostgreSQL 10, so neither does this charm. If you're deploying on bionic, you'll need to deploy a 9.x version of PostgreSQL.
After deploying and relating the charm to postgresql, install the vault snap locally and use "vault init" to create the master key shards and the root token, and store them safely.
Network Spaces support
The vault charm directly supports network binding via the 'access' extra-binding and the 'cluster' peer relation. These allow the Vault API and inter-unit Cluster addresses to be configured using Juju network spaces.