multipass launch -m2G -c2 -d5G -n "k8scp" lts --network "en0"
wget https://cm.lf.training/LFS258/LFS258_V2023-09-14_SOLUTIONS.tar.xz --user=LFtraining --password=Penguin2014
tar -xvf LFS258_V2023-09-14_SOLUTIONS.tar.xz
export VAULT_ADDR=https://localhost:8200 | |
export VAULT_TOKEN=root | |
CHILD_CA=admin/kms | |
# Root CA | |
vault secrets enable -path=pki_root pki | |
# tune to 10 years | |
vault secrets tune -max-lease-ttl=87600h pki_root | |
# Generate internal certificate |
resource "vault_mount" "ca_root" { | |
path = "ca_root" | |
type = "pki" | |
max_lease_ttl_seconds = 315360000 # 10 years | |
} | |
resource "vault_pki_secret_backend_root_cert" "ca_root" { | |
backend = vault_mount.ca_root.path |
#!/usr/bin/env zsh | |
########### | |
# Root CA # | |
########### | |
vault secrets enable pki | |
vault secrets tune -max-lease-ttl=87600h pki |
resource "vault_mount" "ldap" { | |
path = "ldap" | |
type = "openldap" | |
description = "LDAP Secret Engine" | |
} | |
resource "vault_generic_endpoint" "openldapconfig" { | |
depends_on = [vault_mount.ldap] | |
path = "${vault_mount.ldap.path}/config" |
Executing the command below will bring a list of entities , their auth method and their id: | |
Export VAULT_ADDR=https://<Vault_address>:8200 | |
export VAULT_TOKEN=<Vault_token> | |
export VAULT_NAMESPACE=<Vault_namespace> |
################################################ start ################################################# | |
############################### | |
export VAULT_ADDR=https://vault.hashidemos.io:8200 | |
export VAULT_TOKEN=s.evX | |
# Set up the PKI Secret Engine | |
############################### | |
## Root CA Mount |
import hudson.util.Secret | |
import com.datapipe.jenkins.vault.credentials.* | |
import com.cloudbees.plugins.credentials.impl.* | |
import com.cloudbees.plugins.credentials.* | |
import com.cloudbees.plugins.credentials.domains.* | |
| |
| |
VaultAppRoleCredential customCredential = new VaultAppRoleCredential( | |
CredentialsScope.GLOBAL, | |
'custom-credential', |
global: | |
# enabled is the master enabled switch. Setting this to true or false | |
# will enable or disable all the components within this chart by default. | |
enabled: true | |
# TLS for end-to-end encrypted transport | |
tlsDisable: true | |
# If deploying to OpenShift | |
psp: | |
enable: false |
variable "vault_host" { | |
description = "Vault hostname" | |
default = "vault.ric-lnd-stack.ric.aws.hashidemos.io" | |
} | |
terraform { | |
backend "remote" { | |
organization = "hc-emea-sentinel-demo" | |
workspaces { | |
name = "vault-integration" | |
} |