mirror of
https://github.com/tldr-pages/tldr.git
synced 2025-04-29 23:24:55 +02:00

* zstd: add link to homepage * zsh: add link to homepage * zopflipng: add link to homepage * zbarimg: add link to homepage * z: add link to homepage * yesod: add link to homepage * xsv: add link to homepage * xo: add link to homepage * xcv: add link to homepage * wuzz: add link to homepage * wordgrinder: add link to homepage * wget: add link to homepage * webtorrent: add link to homepage * webpack: add link to homepage * wat2wasm: add link to homepage * w3m: add link to homepage * vue: add link to homepage * vsce: add link to homepage * virtualboxvm: add link to homepage * vim: add link to homepage * vegeta: add link to homepage * vault: add link to homepage * valgrind: add link to homepage * vagrant: add link to homepage * upx: add link to homepage
28 lines
805 B
Markdown
28 lines
805 B
Markdown
# vault
|
|
|
|
> A CLI to interact with HashiCorp Vault.
|
|
> Homepage: <https://www.vaultproject.io/docs/commands>.
|
|
|
|
- Connect to a Vault server and initialize a new encrypted data store:
|
|
|
|
`vault init`
|
|
|
|
- Unseal (unlock) the vault, by providing one of the key shares needed to access the encrypted data store:
|
|
|
|
`vault unseal {{key-share-x}}`
|
|
|
|
- Authenticate the CLI client against the Vault server, using an authentication token:
|
|
|
|
`vault auth {{authentication_token}}`
|
|
|
|
- Store a new secret in the vault, using the generic back-end called "secret":
|
|
|
|
`vault write secret/{{hello}} value={{world}}`
|
|
|
|
- Read a value from the vault, using the generic back-end called "secret":
|
|
|
|
`vault read secret/{{hello}}`
|
|
|
|
- Seal (lock) the Vault server, by removing the encryption key of the data store from memory:
|
|
|
|
`vault seal`
|