|
3 jaren geleden | |
---|---|---|
.. | ||
cloud-init | 4 jaren geleden | |
README.md | 3 jaren geleden | |
amis.tf | 4 jaren geleden | |
certificate.tf | 3 jaren geleden | |
constants.tf | 3 jaren geleden | |
dynamodb.tf | 3 jaren geleden | |
elb.tf | 3 jaren geleden | |
globals.tf | 3 jaren geleden | |
instance_profile.tf | 3 jaren geleden | |
kms.tf | 3 jaren geleden | |
main.tf | 3 jaren geleden | |
outputs.tf | 3 jaren geleden | |
vars.tf | 3 jaren geleden |
terragrunt apply
salt vault*com saltutil.sync_all
salt vault*com saltutil.refresh_pillar
salt vault*com state.sls os_modifications test=true --state-output=changes
salt vault*com state.highstate test=true --state-output=changes
salt vault*com state.sls salt_minion.salt_minion_proxy test=true --state-output=changes
salt vault*com state.sls vault test=true --state-output=changes
salt vault*com state.sls vault pillar='{"kms_key_id": "<new-kms-key>"}' test=true --state-output=changes
export VAULT_ADDR=https://127.0.0.1
export VAULT_SKIP_VERIFY=1
vault status
vault operator init -recovery-shares=5 -recovery-threshold=2
vim ~/.vault-token
export VAULT_ADDR=https://internal-vault-alb-test-778772793.us-gov-east-1.elb.amazonaws.com
. Replace the ALB address with the current ALB DNS address. This is due to Golang DNS not updating when connected to XDR over VPN. Vault binary is written in Go.terragrunt apply
vault write auth/aws/config/client sts_endpoint=https://sts.us-gov-east-1.amazonaws.com sts_region=us-gov-east-1
vault token revoke <root-token>
https://github.mdr.defpoint.com/mdr-engineering/infrastructure-notes/blob/master/Vault%20Notes.md
VAULT_TOKEN
: Login to vault, and click your name dropdown, then copy token. You'll need it more than once.Then apply:
VAULT_TOKEN=<fromvault> terragrunt apply