1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-04-29 23:24:55 +02:00
tldr/pages/common/vault.md
Owen Voke c4e95b92c4 multiple pages: add homepages (#3026)
* zstd: add link to homepage

* zsh: add link to homepage

* zopflipng: add link to homepage

* zbarimg: add link to homepage

* z: add link to homepage

* yesod: add link to homepage

* xsv: add link to homepage

* xo: add link to homepage

* xcv: add link to homepage

* wuzz: add link to homepage

* wordgrinder: add link to homepage

* wget: add link to homepage

* webtorrent: add link to homepage

* webpack: add link to homepage

* wat2wasm: add link to homepage

* w3m: add link to homepage

* vue: add link to homepage

* vsce: add link to homepage

* virtualboxvm: add link to homepage

* vim: add link to homepage

* vegeta: add link to homepage

* vault: add link to homepage

* valgrind: add link to homepage

* vagrant: add link to homepage

* upx: add link to homepage
2019-05-14 13:09:07 -03:00

28 lines
805 B
Markdown

# vault
> A CLI to interact with HashiCorp Vault.
> Homepage: <https://www.vaultproject.io/docs/commands>.
- Connect to a Vault server and initialize a new encrypted data store:
`vault init`
- Unseal (unlock) the vault, by providing one of the key shares needed to access the encrypted data store:
`vault unseal {{key-share-x}}`
- Authenticate the CLI client against the Vault server, using an authentication token:
`vault auth {{authentication_token}}`
- Store a new secret in the vault, using the generic back-end called "secret":
`vault write secret/{{hello}} value={{world}}`
- Read a value from the vault, using the generic back-end called "secret":
`vault read secret/{{hello}}`
- Seal (lock) the Vault server, by removing the encryption key of the data store from memory:
`vault seal`