Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/earthquakesan/vault-pki-example
https://github.com/earthquakesan/vault-pki-example
Last synced: 28 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/earthquakesan/vault-pki-example
- Owner: earthquakesan
- Created: 2022-07-03T11:54:00.000Z (over 2 years ago)
- Default Branch: master
- Last Pushed: 2022-07-03T12:07:46.000Z (over 2 years ago)
- Last Synced: 2024-11-16T13:04:49.187Z (3 months ago)
- Language: HCL
- Size: 1.95 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Vault PKI Configuration
The example is taken from: https://learn.hashicorp.com/tutorials/vault/pki-engine?in=vault/secrets-management
Start the vault server (requires docker):
```
make start
```Connect to the running server:
```
make connect
```Provision backends and the certificates (will be saved under certs/ path):
```
make terraform
```To navigate to vault open http://localhost:8200 in the browser.
WARNING: the cert and key are stored in the terraform state (!) Make sure to encrypt it and do not allow users to access the terraform state.
# Notes
The certificate monitoring needs to be configured externally, for example with prometheus:
* https://schh.medium.com/prometheus-continuous-monitoring-of-ssl-expiration-8406cf4df5a0
The certificates are available under paths such as (do not require auth):
* http://localhost:8200/v1/pki_int/cert/40:dd:cc:ed:26:47:02:86:ab:fb:c8:ce:83:08:b4:9c:24:19:a9:2c
# Manual Certificate Generation
To generate CA and the certificates by hand, see for example:
* https://docs.microsoft.com/en-us/azure/application-gateway/self-signed-certificates