mirror of
https://github.com/hashicorp/vault.git
synced 2026-05-05 04:16:31 +02:00
Update alert partials and files that include them (#22556)
This commit is contained in:
parent
83f3e391c2
commit
04fc15471b
@ -6,7 +6,7 @@ description: The '/sys/config/control-group' endpoint configures control groups.
|
||||
|
||||
# `/sys/config/control-group`
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
The `/sys/config/control-group` endpoint is used to configure Control Group
|
||||
settings.
|
||||
|
||||
@ -6,7 +6,7 @@ description: The '/sys/config/group-policy-application' endpoint is used to conf
|
||||
|
||||
# `/sys/config/group-policy-application`
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
The `sys/config/group-policy-application` endpoint can be used to configure the
|
||||
mode of policy application for identity groups in Vault. This setting dictates
|
||||
|
||||
@ -6,7 +6,7 @@ description: The '/sys/control-group' endpoint handles the Control Group workflo
|
||||
|
||||
## Authorize control group request
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
This endpoint authorizes a control group request.
|
||||
|
||||
|
||||
@ -6,7 +6,7 @@ description: The `/sys/quotas/lease-count` endpoint is used to create, edit and
|
||||
|
||||
# `/sys/quotas/lease-count`
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
The `/sys/quotas/lease-count` endpoint is used to create, edit and delete lease count quotas.
|
||||
|
||||
|
||||
@ -8,7 +8,7 @@ description: |-
|
||||
|
||||
# `/sys/license/status`
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
The `/sys/license/status` endpoint is used to view update the license used in
|
||||
Vault.
|
||||
|
||||
@ -8,7 +8,7 @@ description: >-
|
||||
|
||||
# `/sys/replication`
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
## Attempt recovery
|
||||
|
||||
|
||||
@ -8,7 +8,7 @@ description: >-
|
||||
|
||||
# `/sys/replication/performance`
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
## Check performance status
|
||||
|
||||
|
||||
@ -8,7 +8,7 @@ description: >-
|
||||
|
||||
# `/sys/sealwrap/rewrap`
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
The `/sys/sealwrap/rewrap` endpoint is used to rewrap all seal wrapped entries.
|
||||
This is useful when you want to upgrade seal wrapped entries to use the latest
|
||||
|
||||
@ -16,7 +16,7 @@ snapshots with Vault's Raft storage backend.
|
||||
|
||||
## Create/update an automated snapshots config
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
**This endpoint requires sudo capability.**
|
||||
|
||||
|
||||
@ -9,7 +9,7 @@ description: |-
|
||||
|
||||
# Automated integrated storage snapshots
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Any production system should include a provision for taking regular backups.
|
||||
Vault Enterprise can be configured to take and store snapshots at a specific
|
||||
|
||||
@ -6,7 +6,7 @@ description: Vault Enterprise Consistency Model
|
||||
|
||||
# Vault eventual consistency
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
When running in a cluster, Vault has an eventual consistency model.
|
||||
Only one node (the leader) can write to Vault's storage.
|
||||
|
||||
@ -6,7 +6,7 @@ description: Vault Enterprise has support for Control Group Authorization.
|
||||
|
||||
# Vault Enterprise control groups
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Vault Enterprise has support for Control Group Authorization. Control Groups
|
||||
add additional authorization factors to be required before satisfying a request.
|
||||
|
||||
@ -8,7 +8,7 @@ description: >-
|
||||
|
||||
# Vault enterprise HSM behavioral changes
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
This page contains information about the behavioral differences that take
|
||||
effect when using Vault with an HSM.
|
||||
|
||||
@ -8,7 +8,7 @@ description: >-
|
||||
|
||||
# Vault enterprise HSM support
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
- Root key Wrapping: Vault protects its root key by transiting it through
|
||||
the HSM for encryption rather than splitting into key shares
|
||||
|
||||
@ -6,7 +6,7 @@ description: Recommendations to ensure the security of a Vault Enterprise HSM de
|
||||
|
||||
# Vault enterprise HSM security details
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
This page provides information to help ensure that a Vault HSM deployment is
|
||||
performed as securely as possible.
|
||||
|
||||
@ -6,7 +6,7 @@ description: An overview of license autoloading.
|
||||
|
||||
# License autoloading
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Prior to Vault 1.8, Vault Enterprise would be licensed using special binaries
|
||||
that contained embedded licenses, or via a license written into Vault storage
|
||||
|
||||
@ -6,7 +6,7 @@ description: An overview of license.
|
||||
|
||||
# Vault license
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Licenses and EULA enhancements have been introduced in Vault 1.8 release. Please refer to the [FAQ](/vault/docs/enterprise/license/faq) for common questions concerning these changes.
|
||||
|
||||
|
||||
@ -7,7 +7,7 @@ description: >-
|
||||
|
||||
# Automated license utilization reporting
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Automated license utilization reporting sends license utilization data to
|
||||
HashiCorp without requiring you to manually collect and report them. It also
|
||||
|
||||
@ -7,7 +7,7 @@ description: >-
|
||||
|
||||
# Managed keys
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Within certain environments, customers want to leverage key management systems
|
||||
external to Vault, when handling, storing, and interacting with
|
||||
|
||||
@ -8,7 +8,7 @@ description: >-
|
||||
|
||||
# Vault enterprise MFA support
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Vault Enterprise has support for Multi-factor Authentication (MFA), using
|
||||
different authentication types. MFA is built on top of the Identity system of
|
||||
|
||||
@ -6,7 +6,7 @@ description: Vault Enterprise supports Duo MFA type.
|
||||
|
||||
# Duo MFA
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
This page demonstrates the Duo MFA on ACL'd paths of Vault.
|
||||
|
||||
|
||||
@ -6,7 +6,7 @@ description: Vault Enterprise supports Okta MFA type.
|
||||
|
||||
# Okta MFA
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
This page demonstrates the Okta MFA on ACL'd paths of Vault.
|
||||
|
||||
|
||||
@ -6,7 +6,7 @@ description: Vault Enterprise supports PingID MFA type.
|
||||
|
||||
# PingID MFA
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
This page demonstrates PingID MFA on ACL'd paths of Vault.
|
||||
|
||||
|
||||
@ -6,7 +6,7 @@ description: Vault Enterprise supports TOTP MFA type.
|
||||
|
||||
# TOTP MFA
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
This page demonstrates the TOTP MFA on ACL'd paths of Vault.
|
||||
|
||||
|
||||
@ -6,7 +6,7 @@ description: Performance Standby Nodes - Vault Enterprise
|
||||
|
||||
# Performance standby nodes
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Vault supports a multi-server mode for high availability. This mode protects
|
||||
against outages by running multiple Vault servers. High availability mode
|
||||
|
||||
@ -7,7 +7,7 @@ description: |-
|
||||
|
||||
# Vault with AWS KMS external key store (XKS) via PKCS#11 and XKS proxy
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
~> **Note**: AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) is used in this document as a sample implementation.
|
||||
|
||||
|
||||
@ -9,7 +9,7 @@ description: |-
|
||||
|
||||
# PKCS#11 provider
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
-> **Note**: This feature is part of the [KMIP Secret Engine](/vault/docs/secrets/kmip), which requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
||||
with the Advanced Data Protection Module.
|
||||
|
||||
@ -7,7 +7,7 @@ description: |-
|
||||
|
||||
# Oracle TDE
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
[Oracle Transparent Data Encryption](https://docs.oracle.com/en/database/oracle/oracle-database/19/asoag/introduction-to-transparent-data-encryption.html) (TDE)
|
||||
is supported with the [Vault PKCS#11 provider](/vault/docs/enterprise/pkcs11-provider).
|
||||
|
||||
@ -7,7 +7,7 @@ description: |-
|
||||
|
||||
# Redundancy zones
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Vault Enterprise Redundancy Zones provide both read scaling and resiliency benefits by enabling
|
||||
the deployment of non-voting nodes alongside voting nodes on a per availability zone basis.
|
||||
|
||||
@ -83,7 +83,7 @@ secondaries to have a different configuration than their primary. Tokens and le
|
||||
|
||||
## Performance replication
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
In Performance Replication, secondaries keep track of their own tokens and leases
|
||||
but share the underlying configuration, policies, and supporting secrets (K/V values,
|
||||
|
||||
@ -8,7 +8,7 @@ description: |-
|
||||
|
||||
# Seal wrap
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Vault Enterprise features a mechanism to wrap values with an extra layer of
|
||||
encryption for supporting [seals](/vault/docs/configuration/seal). This adds an
|
||||
|
||||
@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
|
||||
|
||||
# Examples
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Following are some examples that help to introduce concepts. If you are
|
||||
unfamiliar with writing Sentinel policies in Vault, please read through to
|
||||
|
||||
@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
|
||||
|
||||
# Vault Enterprise and Sentinel integration
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Vault Enterprise integrates HashiCorp Sentinel to provide a rich set of access
|
||||
control functionality. Because Vault is a security-focused product trusted with
|
||||
|
||||
@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
|
||||
|
||||
# Properties
|
||||
|
||||
@include 'alerts/enterprise-and-hcp.mdx'
|
||||
@include 'alerts/enterprise-and-hcp-plus.mdx'
|
||||
|
||||
Vault injects a rich set of data into the running Sentinel environment,
|
||||
allowing for very fine-grained controls. The set of available properties are
|
||||
|
||||
@ -0,0 +1,7 @@
|
||||
<EnterpriseAlert product="vault">
|
||||
<a href="https://www.hashicorp.com/products/vault/pricing">
|
||||
Vault Enterprise
|
||||
</a> license or <a href="/hcp/docs/vault/tiers-and-features#plus-tier">
|
||||
HCP Vault Plus
|
||||
</a> cluster required.
|
||||
</EnterpriseAlert>
|
||||
@ -1,6 +1,7 @@
|
||||
<EnterpriseAlert product="vault">
|
||||
<a href="https://www.hashicorp.com/products/vault/pricing">Vault Enterprise</a>
|
||||
license or
|
||||
<a href="/hcp/docs/vault/tiers-and-features#plus-tier">HCP Vault Plus</a>
|
||||
cluster required
|
||||
<a href="https://www.hashicorp.com/products/vault/pricing">
|
||||
Vault Enterprise
|
||||
</a> license or <a href="/hcp/docs/vault/tiers-and-features">
|
||||
HCP Vault
|
||||
</a> cluster required.
|
||||
</EnterpriseAlert>
|
||||
Loading…
x
Reference in New Issue
Block a user