Becca Petrin
54c70efd88
update path for mounting plugin ( #6351 )
2019-03-06 15:57:03 -08:00
Calvin Leung Huang
66734fb03c
docs/agent-caching: update cache-clear endpoint ( #6354 )
2019-03-06 11:13:43 -08:00
Becca Petrin
1c34a1d21e
update partnership doc ( #6352 )
2019-03-06 10:27:12 -08:00
Calvin Leung Huang
0ebce62537
docs/agent-caching: add note about compatibility with older server versions
2019-03-05 14:12:04 -08:00
Vishal Nayak
d0b9454518
Agent Cache doc updates ( #6331 )
...
* Agent Cache doc updates
* doc update
* Add renewal management section
* doc updates
* paraphrase the orphan token case
2019-03-05 15:19:52 -05:00
Vishal Nayak
d8f39d54c9
Change agent's port to 8007 ( #6348 )
2019-03-05 12:57:17 -05:00
Jim Kalafut
1274a8d3d4
Update JWT plugin dependency and docs ( #6345 )
2019-03-05 09:46:04 -08:00
Chris Hoffman
8a57b90b47
Transit Auto Seal Docs ( #6332 )
...
* adding transit seal docs
* add missing backtick
2019-03-05 08:45:44 -05:00
Naoki Ainoya
7b395315dd
fix doc to add missing permission to use gcpkms seal ( #6327 )
2019-03-04 11:46:06 -05:00
Becca Petrin
7b4a184a52
Merge pull request #6224 from hashicorp/dp.fix-consul-storage-doc-6171
...
Fix example in documentation. Resolves [issue 6171]
2019-02-28 09:55:55 -08:00
Andrey Kuzmin
b496fea4ad
Etcd timeouts ( #6285 )
...
* Configurable lock and request etcd timeouts.
If etcd cluster placed on slow servers - request timeouts may be much greater, then hardcoded default values.
Also, in etcd setup, like above - may be need to greater lock timeout.
* Configurable lock and request etcd timeouts.
Docs.
* Use user friendly timeout syntax.
To allow specify more readable time values.
2019-02-27 18:34:29 -08:00
Jon Currey
e9891013b3
Fix typo on Seal page of concepts docs ( #6290 )
2019-02-27 18:27:36 -08:00
John O'Sullivan
62f454c972
Documenting -dev-plugin-dir vault server option ( #6307 )
...
Based on an answer from Brian Kassouf on the Google Group: https://groups.google.com/d/msg/vault-tool/7Qf9Hn1w3jA/yGUIKZxHGAAJ
2019-02-27 18:24:49 -08:00
vishalnayak
1d16601b7f
Agent caching docs superscript beta
2019-02-26 10:36:24 -05:00
vishalnayak
dee2e1797d
Add Beta superscript to caching docs
2019-02-26 10:28:55 -05:00
vishalnayak
2ab27e6087
Agent doc update for beta testers
2019-02-26 10:20:55 -05:00
vishalnayak
f04b4d1668
Change agent's default port number to 8100
2019-02-26 10:02:12 -05:00
Calvin Leung Huang
5b5ec851c7
Agent caching docs ( #6272 )
...
* WIP agent caching docs
* More docs updates
* Add caching/index.html to docs_detailed_categories.yml
* Some more docs updates
* Some more docs updates
* updates
* address review feedback
* fix sample config
* Update website/source/docs/agent/caching/index.html.md
Co-Authored-By: calvn <cleung2010@gmail.com>
* fix config for sidebar display
* Add environment variable to the docs
2019-02-26 09:57:17 -05:00
Jim Kalafut
9bac5158cd
Update JWT docs for OIDC feature ( #6270 )
2019-02-21 17:06:23 -08:00
Chris Hoffman
481c38c7d0
adding 1.1 upgrade docs ( #6279 )
2019-02-21 17:41:06 -05:00
dp-h
e8bc0e7ab2
Revert "Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171]"
...
This reverts commit 7726fdd1aaf7848dc5af9d4867e76bd1588f7bac.
Revert to go through proper PR. Apologies.
2019-02-14 13:40:17 -07:00
Brian Shumate
c7ceffba30
Update configuration/listener documentation ( #6228 )
...
- Clarify that PROXY protocol version 1 is currently supported
- Add missing backtick to fix formatting issue
2019-02-13 09:27:05 -05:00
dp-h
72880b965a
Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171]
2019-02-12 17:05:31 -07:00
dominic
ed6d45eece
Revert "Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171]"
...
This reverts commit b275f2a1e6d74400bb3cf702d1e03c90d31624cb.
Pushed to master, my apologies. Will do proper PR for this.
2019-02-12 16:49:34 -07:00
dominic
f11a29d13c
Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171]
2019-02-12 16:47:17 -07:00
vishalnayak
8a6cd92f85
Update transit docs
2019-02-12 14:27:17 -05:00
Graham Land
13e60dbb40
Add Vault supported log levels ( #6185 )
...
Documentation : Add the supported log level configurations
`Supported log levels: Trace, Debug, Error, Warn, Info.`
2019-02-07 11:27:08 -08:00
Eero Niemi
f9cb767d9c
Fixed typo (newtwork -> network) ( #6177 )
2019-02-07 13:06:38 -05:00
Jeff Mitchell
ea61e8fbec
Remove refresh_interval from kvv1 API docs and CLI docs since kv get doesn't use it
2019-02-06 21:51:08 -05:00
d
97a73d6bf8
Revert "fixed trailing slash in consul.html.md example"
...
This reverts commit 4310bb58c83285ebd9cfcb302b70d1db432a11e2.
Accidental push to master, my apologies. See PR https://github.com/hashicorp/vault/pull/6175
2019-02-05 17:42:15 -07:00
Dominic Porreco
778e6add49
fixed trailing slash in consul.html.md example
2019-02-05 17:01:39 -07:00
Yoko
a9392f9840
Adding a mention for 'kv-v2' as type ( #6151 )
2019-02-01 11:26:08 -08:00
Jeff Mitchell
b2cc9ebd3a
Remove regenerate-key docs as it no longer exists
2019-02-01 09:29:40 -05:00
Donald Guy
4363453017
Docs: Azure auth example using metadata service ( #6124 )
...
There are probably better ways to massage this but I think it would be helpful to have something like this included
2019-01-30 12:13:39 -08:00
Brian Shumate
2337df4b2b
Update documentation for command operator unseal ( #6117 )
...
- Add migrate command option
2019-01-28 10:27:51 -05:00
Gordon Shankman
cd2f7bbde8
Adding support for SSE in the S3 storage backend. ( #5996 )
2019-01-26 16:48:08 -05:00
Calvin Leung Huang
34af3daeb0
docs: update agent sample config ( #6096 )
2019-01-24 07:25:03 -05:00
Jeff Mitchell
3f1a7d4fdd
Update to latest etcd and use the new repository packages ( #6087 )
...
This will be necessary for go mod work
Additionally, the srv api has changed. This adapts to it.
2019-01-23 14:35:03 -05:00
gitirabassi
1aaacda3ec
small fixes to docs and indexes
2019-01-18 02:14:57 +01:00
Yoko
e09f058ada
Adding the CLI flag placement info ( #6027 )
...
* Adding the CLI flag placement info
* Adding the definition of 'options' and 'args'
* tweaked the wording a little bit
* Added more description in the example
* Added a link to 'Flags' in the doc for options def
2019-01-15 11:24:50 -08:00
Jim Kalafut
960eb45014
Remove unnecessary permission
2019-01-10 16:18:10 -08:00
Seth Vargo
e726f13957
Simplify permission requirements for GCP things ( #6012 )
2019-01-10 10:05:21 -08:00
Yoko
0a97f95ff4
Document upper limit on Transit encryption size ( #6014 )
2019-01-08 17:57:43 -08:00
Giacomo Tirabassi
0d3845c537
Influxdb secret engine built-in plugin ( #5924 )
...
* intial work for influxdb secret plugin
* fixed typo
* added comment
* added documentation
* added tests
* fixed tests
* added vendoring
* minor testing issue with hardcoded values
* minor fixes
2019-01-08 17:26:16 -08:00
Julien Blache
91d432fc85
FoundationDB backend TLS support and housekeeping ( #5800 )
...
* Fix typo in documentation
* Update fdb-go-install.sh for new release tags
* Exclude FoundationDB bindings from vendoring, delete vendored copy
FoundationDB bindings are tightly coupled to the server version and
client library version used in a specific deployment. Bindings need
to be installed using the fdb-go-install.sh script, as documented in
the foundationdb backend documentation.
* Add TLS support to FoundationDB backend
TLS support appeared in FoundationDB 5.2.4, raising the minimum API version
for TLS-aware FoundationDB code to 520.
* Update documentation for FoundationDB TLS support
2019-01-08 09:01:44 -08:00
Seth Vargo
46cbfb0e4b
Fix formatting ( #6009 )
...
The new markdown parser is less forgiving
2019-01-08 08:51:37 -08:00
Thomas Kula
4265579aaa
Fix small typo in azure.html.md ( #6004 )
2019-01-07 10:03:22 -05:00
Aric Walker
c065b46f42
Remove duplicate "Users can" from policy md ( #6002 )
2019-01-07 07:02:28 -08:00
Seth Vargo
c3f1043c24
Reduce required permissions for the GCPCKMS auto-unsealer ( #5999 )
...
This changes the behavior of the GCPCKMS auto-unsealer setup to attempt
encryption instead of a key lookup. Key lookups are a different API
method not covered by roles/cloudkms.cryptoKeyEncrypterDecrypter. This
means users must grant an extended scope to their service account
(granting the ability to read key data) which only seems to be used to
validate the existence of the key.
Worse, the only roles that include this permission are overly verbose
(e.g. roles/viewer which gives readonly access to everything in the
project and roles/cloudkms.admin which gives full control over all key
operations). This leaves the user stuck between choosing to create a
custom IAM role (which isn't fun) or grant overly broad permissions.
By changing to an encrypt call, we get better verification of the unseal
permissions and users can reduce scope to a single role.
2019-01-04 16:29:31 -05:00
Seth Vargo
1917bb406d
Fix audit docs ( #6000 )
...
These appear to have been converted to (bad) HTML. This returns them to
their original markdown format.
2019-01-04 13:45:50 -06:00