Ver código fonte

Improves README and Points to Updated Module

Brad Poulton 4 anos atrás
pai
commit
50c03692ff

+ 4 - 0
prod/aws-us-gov/mdr-prod-c2/090-instance-vault/README.md

@@ -7,7 +7,9 @@
   - `salt vault*com saltutil.refresh_pillar`
   - `salt vault*com state.sls os_modifications test=true --state-output=changes`
   - `salt vault*com state.highstate test=true --state-output=changes`
+  - `salt vault*com state.sls salt_minion.salt_minion_proxy test=true --state-output=changes`
   - `salt vault*com state.sls vault test=true --state-output=changes`
+  - `salt vault*com state.sls vault pillar='{"kms_key_id": "<new-kms-key>"}' test=true --state-output=changes`
 - Ensure Vault is running and unseal the Vault via CLI on ONE of the Vault servers
   - `export VAULT_ADDR=https://127.0.0.1`
   - `export VAULT_SKIP_VERIFY=1`
@@ -20,6 +22,8 @@
   - Why not use the accenturefederal address? This is due to golang DNS issues.
   - Download the vault binary ( might not be needed? Is the binary in the TF provider? )
   - `terragrunt apply`
+  - Might need this command as well. See main.tf in module for more information.
+  - `vault write auth/aws/config/client sts_endpoint=https://sts.us-gov-east-1.amazonaws.com sts_region=us-gov-east-1`
   - The Terraform Vault provider will look at ~/.vault-token for the token and the bash variables for the address to connect to.
 - Revoke the root token
   - `vault token revoke <root-token>`

+ 1 - 1
prod/aws-us-gov/mdr-prod-c2/090-instance-vault/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.mdr.defpoint.com:mdr-engineering/xdr-terraform-modules.git//base/vault?ref=v0.9.10"
+  source = "git@github.mdr.defpoint.com:mdr-engineering/xdr-terraform-modules.git//base/vault?ref=v0.9.12"
 }
 
 dependency "vpc-system-services" {

+ 1 - 1
prod/aws-us-gov/mdr-prod-c2/099-vault-configuration/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.mdr.defpoint.com:mdr-engineering/xdr-terraform-modules.git//base/vault-configuration?ref=v0.9.10"
+  source = "git@github.mdr.defpoint.com:mdr-engineering/xdr-terraform-modules.git//base/vault-configuration?ref=v0.9.12"
 }
 
 dependency "vpc-system-services" {

+ 1 - 1
test/aws-us-gov/mdr-test-c2/090-instance-vault/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.mdr.defpoint.com:mdr-engineering/xdr-terraform-modules.git//base/vault?ref=v0.9.10"
+  source = "git@github.mdr.defpoint.com:mdr-engineering/xdr-terraform-modules.git//base/vault?ref=v0.9.12"
 }
 
 dependency "vpc-system-services" {

+ 1 - 1
test/aws-us-gov/mdr-test-c2/099-vault-configuration/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.mdr.defpoint.com:mdr-engineering/xdr-terraform-modules.git//base/vault-configuration?ref=v0.9.10"
+  source = "git@github.mdr.defpoint.com:mdr-engineering/xdr-terraform-modules.git//base/vault-configuration?ref=v0.9.12"
 }
 
 dependency "vpc-system-services" {