Vaccino¶
Traduzione: Copia tutti i comandi
Traduzione: Generare PDF
< >
HashiCorp completo Comandi e flussi di lavoro Vault per la gestione dei segreti, la crittografia e l'accesso sicuro ai dati sensibili.
## Installazione e configurazione
|Command|Description|
|---------|-------------|
|`vault version`|Show Vault version|
|`vault server -dev`|Start development server|
|`vault server -config=config.hcl`|Start with configuration file|
|`vault status`|Check server status|
## Autenticazione & Login
### Autenticazione di base
|Command|Description|
|---------|-------------|
|`vault auth -method=userpass username=myuser`|Login with username/password|
|`vault auth -method=ldap username=myuser`|Login with LDAP|
|`vault auth -method=github token=mytoken`|Login with GitHub|
|`vault auth -method=aws`|Login with AWS IAM|
|`vault auth -method=kubernetes`|Login with Kubernetes|
### Gestione dei token
|Command|Description|
|---------|-------------|
|`vault token create`|Create new token|
|`vault token create -ttl=1h`|Create token with TTL|
|`vault token lookup`|Look up current token|
|`vault token renew`|Renew current token|
|`vault token revoke TOKEN`|Revoke specific token|
## Gestione dei segreti
### Segreti chiave-valore (v2)
|Command|Description|
|---------|-------------|
|`vault kv put secret/myapp username=admin password=secret`|Store secret|
|`vault kv get secret/myapp`|Retrieve secret|
|`vault kv get -field=password secret/myapp`|Get specific field|
|`vault kv delete secret/myapp`|Delete secret|
|`vault kv list secret/`|List secrets|
|`vault kv metadata get secret/myapp`|Get metadata|
### Versioni segrete
|Command|Description|
|---------|-------------|
|`vault kv put secret/myapp @data.json`|Store from JSON file|
|`vault kv get -version=2 secret/myapp`|Get specific version|
|`vault kv rollback -version=1 secret/myapp`|Rollback to version|
|`vault kv destroy -versions=2,3 secret/myapp`|Destroy versions|
|`vault kv undelete -versions=2 secret/myapp`|Undelete versions|
## Database Secrets Engine
### Configurazione del database
|Command|Description|
|---------|-------------|
|`vault secrets enable database`|Enable database engine|
|`vault write database/config/my-mysql-database plugin_name=mysql-database-plugin connection_url="\\{\\{username\\}\\}:\\{\\{password\\}\\}@tcp(localhost:3306)/" allowed_roles="my-role" username="vaultuser" password="vaultpass"`|Configure MySQL|
|`vault write database/roles/my-role db_name=my-mysql-database creation_statements="CREATE USER '\\{\\{name\\}\\}'@'%' IDENTIFIED BY '\\{\\{password\\}\\}';GRANT SELECT ON *.* TO '\\{\\{name\\}\\}'@'%';" default_ttl="1h" max_ttl="24h"`|Create role|
### Credenziali dinamiche
|Command|Description|
|---------|-------------|
|`vault read database/creds/my-role`|Generate database credentials|
|`vault write database/rotate-root/my-mysql-database`|Rotate root credentials|
## PKI (Infrastruttura chiave pubblica)
### Set di PKI
|Command|Description|
|---------|-------------|
|`vault secrets enable pki`|Enable PKI engine|
|`vault secrets tune -max-lease-ttl=87600h pki`|Set max TTL|
|`vault write pki/root/generate/internal common_name=example.com ttl=87600h`|Generate root CA|
|`vault write pki/config/urls issuing_certificates="http://vault.example.com:8200/v1/pki/ca" crl_distribution_points="http://vault.example.com:8200/v1/pki/crl"`|Configure URLs|
### Gestione certificati
|Command|Description|
|---------|-------------|
|`vault write pki/roles/example-dot-com allowed_domains=example.com allow_subdomains=true max_ttl=72h`|Create role|
|`vault write pki/issue/example-dot-com common_name=test.example.com`|Issue certificate|
|`vault write pki/revoke serial_number=39:dd:2e:90:b7:23:1f:8d:d3:7d:31:c5:1b:da:84:d0:5b:65:31:58`|Revoke certificate|
## AWS Secrets Engine
### Configurazione AWS
|Command|Description|
|---------|-------------|
|`vault secrets enable aws`|Enable AWS engine|
|`vault write aws/config/root access_key=AKIAI... secret_key=R4nm...`|Configure root credentials|
|`vault write aws/roles/my-role credential_type=iam_user policy_document=-<