Secret
HashiCorp Vault
Integrates the Configu Orchestrator with HashiCorp Vault.
- Name: HashiCorp Vault
- Category: Secret manager
Configuration
Configu needs to be authorized to access your HashiCorp vault account. For this, you need to provide the following parameters: address
, engine
, token
. By default, Configu attempts to use the following environment variables for the vault address and token: VAULT_ADDR
, VAULT_TOKEN
. The engine
parameter must always be provided.
Limitations
- Only supports the K/V2 engine.
Usage
.configu
store declaration
CLI examples
Upsert command
Eval and export commands
Common errors and solutions
-
Authentication failure
- Solution: Ensure the provided
token
is valid and has sufficient permissions. Verify the token with:
- Solution: Ensure the provided
-
Timeout issues
- Solution: Increase the
timeout
value in the configuration if the Vault server takes longer to respond.
- Solution: Increase the
-
Path not Found
- Solution: Ensure the provided
path
exists and the token has access to it. Use:
- Solution: Ensure the provided
-
Certificate errors in HTTPS connections
- Solution: If using HTTPS, ensure that the correct CA certificates are configured. Use the
VAULT_CACERT
environment variable to specify the certificate path:
- Solution: If using HTTPS, ensure that the correct CA certificates are configured. Use the
References
- Integration documentation: https://www.vaultproject.io/docs
Was this page helpful?