#Heading 1
##Heading 2
###Heading 3
####Heading 4
#####Heading 5
variable "vault_host" { | |
description = "Vault hostname" | |
default = "vault.ric-lnd-stack.ric.aws.hashidemos.io" | |
} | |
terraform { | |
backend "remote" { | |
organization = "hc-emea-sentinel-demo" | |
workspaces { | |
name = "vault-integration" | |
} |
#Heading 1
##Heading 2
###Heading 3
####Heading 4
#####Heading 5
Steps to make a Control Group Notifier | |
1) list all Tokens | |
curl -X LIST \ | |
http://eu-guystack-vault-561637873.eu-west-2.elb.amazonaws.com:8200/v1/auth/token/accessors \ | |
-H 'Accept: */*' \ | |
-H 'Accept-Encoding: gzip, deflate' \ | |
-H 'Cache-Control: no-cache' \ | |
-H 'Connection: keep-alive' \ |
- | |
hosts: localhost | |
gather_facts: false | |
vars: | |
secret_token: '${option.vault_token}' | |
role_id: '${option.approle_id}' | |
tasks: | |
- | |
name: 'Get secret id from role_id' | |
uri: {url: 'http://active.vault.service.consul:8200/v1/auth/approle/role/my-role/secret-id', method: POST, headers: {X-Vault-Token: '{{ secret_token }}'}, body_format: json, status_code: 200} |
{ | |
"variables": { | |
"version": "", | |
"memory" : "8196", | |
"cpucorecount": "4" | |
}, | |
"provisioners": [ | |
{ | |
"type": "file", | |
"source": "bootcamp.rli", |
pipeline { | |
agent any | |
environment { | |
GIT_REPO = "https://github.com/GuyBarros/terraform-azurerm-demostack" | |
TFE_NAME = "app.terraform.io" | |
TFE_URL = "https://app.terraform.io" | |
TFE_ORGANIZATION = "emea-se-playground-2019" | |
TFE_API_URL = "${TFE_URL}/api/v2" |
#!/bin/bash | |
for pid in $(docker ps -a --format="{{.Names}}") | |
do | |
docker logs -f $pid > /tmp/$pid.log 2> /tmp/$pid.err & | |
done | |
tail -f /tmp/*.{log,err} |
{ | |
"acl_datacenter": "dc1", | |
"acl_master_token": "${consul_master_token}", | |
"acl_token": "${consul_master_token}", | |
"acl_default_policy": "allow", | |
"advertise_addr": "$(private_ip)", | |
"advertise_addr_wan": "$(public_ip)", | |
"bootstrap_expect": ${consul_servers}, | |
"bind_addr": "$(private_ip)", | |
"data_dir": "/mnt/consul", |
pipeline { | |
agent any | |
environment { | |
GIT_REPO = "https://github.com/GuyBarros/terraform-aws-demostack/" | |
TFE_URL = "https://app.terraform.io" | |
TFE_ORGANIZATION = "emea-se-playground" | |
TFE_API_URL = "${TFE_URL}/api/v2" | |
TFE_API_TOKEN = credentials("tfe_api_token") |
What you'll need: | |
<recovery key of the primary> | |
<root token of primary> | |
Step 1 - begin process | |
vault operator generate-root -dr-token -init -tls-skip-verify | |
Step 2 - Generate DR Token (repeat one per key shard) | |
vault operator generate-root -tls-skip-verify -dr-token -nonce=<nonce value from step 1> <recovery key of the primary> |