From d101c40b19ded10150ba62a6dd524cd778355106 Mon Sep 17 00:00:00 2001 From: igor Date: Mon, 3 Mar 2025 07:35:47 +0500 Subject: [PATCH] +vault --- Dahy_install.md | 10 ++ HashiCorp_Vault_install.md | 226 +++++++++++++++++++++++++++++++++---- 2 files changed, 212 insertions(+), 24 deletions(-) diff --git a/Dahy_install.md b/Dahy_install.md index a87bada..575b804 100644 --- a/Dahy_install.md +++ b/Dahy_install.md @@ -45,6 +45,16 @@ sections: # An array of sections - title: Uptime-kuma icon: https://raw.githubusercontent.com/louislam/uptime-kuma/b45dc6787db6530e8dda1388a37e8a80683da5a8/public/icon.svg url: http://192.168.200.84:3001 + - title: Gotify + icon: https://192.168.200.84:8080/static/defaultapp.png + url: https://192.168.200.84:8080 + - title: portainer.io + icon: https://icon.icepanel.io/Technology/svg/Portainer.svg + url: https://192.168.200.84:9443 + - title: Prometheus + icon: https://static-00.iconduck.com/assets.00/prometheus-icon-511x512-1vmxbcxr.png + url: http://192.168.200.84:9090 + EOF ``` diff --git a/HashiCorp_Vault_install.md b/HashiCorp_Vault_install.md index d63e9df..b1a3cc9 100644 --- a/HashiCorp_Vault_install.md +++ b/HashiCorp_Vault_install.md @@ -8,7 +8,10 @@ Vault — это инструмент от HashiCorp для безопасног ```sh wsl ``` - +Похоже vault из Москвы недоступен: +```sh +ssh root@45.144.64.218 -p 2200 +``` ### 1.1. Добавление репозитория HashiCorp @@ -29,8 +32,9 @@ wsl Заменяем на: ```text - deb [signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com $(lsb_release -cs) main + deb [signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com noble main ``` +Где noble это кодовое имя Ubuntu 24.04 4. Обновите списки пакетов: @@ -39,7 +43,7 @@ wsl ``` 5. Установите Vault: -```ыр +```sh sudo apt install -y vault ``` @@ -47,17 +51,61 @@ wsl ```sh vault --version ``` +Выдало: Vault v1.18.5 (2cb3755273dbd63f5b0f8ec50089b57ffd3fa330), built 2025-02-24T09:40:28Z + ## 2. Запуск Vault ### 2.1. Запуск в Dev-режиме (только для тестирования) +If work stop it: +```sh + sudo pkill vault +``` +If need delete old data: +```sh + sudo rm -rf ~/.vault-token ~/.vault/ +``` +For find where stored data read file: +```sh + sudo mcedit /etc/vault/config.hcl +``` +In config file find this path: /opt/vault/data + +После удаления базы нужно инициализировать Vault заново: +```sh + sudo vault operator init +``` + +Run in developer mode (in dev mode data stored in RAM): ```sh vault server -dev ``` -- По умолчанию Vault запустится на `http://127.0.0.1:8200/` -- В терминале появится root-токен, который нужно сохранить. +```text +WARNING! dev mode is enabled! In this mode, Vault runs entirely in-memory +and starts unsealed with a single unseal key. The root token is already +authenticated to the CLI, so you can immediately begin using Vault. + +You may need to set the following environment variables: + + $ export VAULT_ADDR='http://127.0.0.1:8200' + +The unseal key and root token are displayed below in case you want to +seal/unseal the Vault or re-authenticate. + +Unseal Key: TMb6A3QI3wJ9kaEeTYo5wEviP23lugJ3Asek2la6V4s= +Root Token: hvs.GsWHRR7ne7gMTZhuPgZdh91w + +Development mode should NOT be used in production installations! +``` + +Теперь Vault работает по адресу: +```sh +start http://127.0.0.1:8200 +``` +Останавливаю нажатием Ctrl + C + ### 2.2. Настройка Vault в режиме сервера @@ -90,11 +138,7 @@ ui = true 4. Создайте systemd-сервис для Vault: ```sh - sudo mcedit /etc/systemd/system/vault.service -``` - -5. Вставьте следующее содержимое: -```ini +sudo tee /etc/systemd/system/vault.service > /dev/null < /dev/null < +``` + +Проверяем зранятся ли токены в хранилище а не в памяти +```sh +vault read sys/auth/token/tune +``` +token_type = default-service, значит Vault не хранит токены + +Включаем хранение токенов: +```sh + vault write sys/auth/token/tune token_type=service +``` + + + +--- Теперь HashiCorp Vault установлен и готов к использованию! 🚀 +