Rename database plugins for SEO (#3156)

When we "nest" like this, it's important to use a common suffix,
"Database Secret Backend" in this case, so that the SEO minions can
properly group search results for end users.
This commit is contained in:
Seth Vargo 2017-08-14 10:46:39 -04:00 committed by Vishal Nayak
parent 4bbaaac6b2
commit 24c4c0c9c2
8 changed files with 25 additions and 35 deletions

View File

@ -1,6 +1,6 @@
---
layout: "docs"
page_title: "Cassandra Database Plugin"
page_title: "Cassandra Database Plugin - Database Secret Backend"
sidebar_current: "docs-secrets-databases-cassandra"
description: |-
The Cassandra plugin for Vault's Database backend generates database credentials to access Cassandra.
@ -21,7 +21,7 @@ information about setting up the Database Backend.
After the Database Backend is mounted you can configure a cassandra connection
by specifying this plugin as the `"plugin_name"` argument. Here is an example
cassandra configuration:
cassandra configuration:
```
$ vault write database/config/cassandra \
@ -59,4 +59,3 @@ plugin API](/api/secret/databases/cassandra.html) page.
For more information on the Database secret backend's HTTP API please see the [Database secret
backend API](/api/secret/databases/index.html) page.

View File

@ -1,6 +1,6 @@
---
layout: "docs"
page_title: "Custom Database Plugins"
page_title: "Custom Database Plugins - Database Secret Backend"
sidebar_current: "docs-secrets-databases-custom"
description: |-
Creating custom database plugins for Vault's Database backend to generate credentials for a database.
@ -12,7 +12,7 @@ The Database backend allows new functionality to be added through a plugin
interface without needing to modify vault's core code. This allows you write
your own code to generate credentials in any database you wish. It also allows
databases that require dynamically linked libraries to be used as plugins while
keeping Vault itself statically linked.
keeping Vault itself statically linked.
~> **Advanced topic!** Plugin development is a highly advanced
topic in Vault, and is not required knowledge for day-to-day usage.
@ -45,10 +45,10 @@ statements to the plugin on function call. The struct is defined as:
```go
type Statements struct {
CreationStatements string
CreationStatements string
RevocationStatements string
RollbackStatements string
RenewStatements string
RollbackStatements string
RenewStatements string
}
```
@ -89,16 +89,16 @@ config wont be used once the plugin unwraps its own TLS cert and key.
The above main package, once built, will supply you with a binary of your
plugin. We also recommend if you are planning on distributing your plugin to
build with [gox](https://github.com/mitchellh/gox) for cross platform builds.
build with [gox](https://github.com/mitchellh/gox) for cross platform builds.
To use your plugin with the Database backend you need to place the binary in the
plugin directory as specified in the [plugin internals](/docs/internals/plugins.html) docs.
plugin directory as specified in the [plugin internals](/docs/internals/plugins.html) docs.
You should now be able to register your plugin into the vault catalog. To do
this your token will need sudo permissions.
this your token will need sudo permissions.
```
$ vault write sys/plugins/catalog/myplugin-database-plugin \
$ vault write sys/plugins/catalog/myplugin-database-plugin \
sha_256=<expected SHA256 Hex value of the plugin binary> \
command="myplugin"
Success! Data written to: sys/plugins/catalog/myplugin-database-plugin
@ -115,7 +115,3 @@ $ vault write database/config/myplugin \
The following warnings were returned from the Vault server:
* Read access to this endpoint should be controlled via ACLs as it will return the connection details as is, including passwords, if any.
```

View File

@ -1,6 +1,6 @@
---
layout: "docs"
page_title: "HANA Database Plugin"
page_title: "HANA Database Plugin - Database Secret Backend"
sidebar_current: "docs-secrets-databases-HANA"
description: |-
The HANA plugin for Vault's Database backend generates database credentials to access SAP HANA Database.
@ -57,4 +57,3 @@ plugin API](/api/secret/databases/HANA.html) page.
For more information on the Database secret backend's HTTP API please see the [Database secret
backend API](/api/secret/databases/index.html) page.

View File

@ -1,6 +1,6 @@
---
layout: "docs"
page_title: "Databases"
page_title: "Database Secret Backend"
sidebar_current: "docs-secrets-databases"
description: |-
Top page for database secret backend information
@ -100,4 +100,3 @@ plugin](/docs/secrets/databases/custom.html) for more information.
The Database secret backend has a full HTTP API. Please see the [Database secret
backend API](/api/secret/databases/index.html) for more details.

View File

@ -1,6 +1,6 @@
---
layout: "docs"
page_title: "MongoDB Database Plugin"
page_title: "MongoDB Database Plugin - Database Secret Backend"
sidebar_current: "docs-secrets-databases-mongodb"
description: |-
The MongoDB plugin for Vault's Database backend generates database credentials to access MongoDB.
@ -21,13 +21,13 @@ information about setting up the Database Backend.
After the Database Backend is mounted you can configure a MongoDB connection
by specifying this plugin as the `"plugin_name"` argument. Here is an example
MongoDB configuration:
MongoDB configuration:
```
$ vault write database/config/mongodb \
plugin_name=mongodb-database-plugin \
allowed_roles="readonly" \
connection_url="mongodb://admin:Password!@mongodb.acme.com:27017/admin?ssl=true"
connection_url="mongodb://admin:Password!@mongodb.acme.com:27017/admin?ssl=true"
The following warnings were returned from the Vault server:
* Read access to this endpoint should be controlled via ACLs as it will return the connection details as is, including passwords, if any.
@ -55,4 +55,3 @@ plugin API](/api/secret/databases/mongodb.html) page.
For more information on the Database secret backend's HTTP API please see the [Database secret
backend API](/api/secret/databases/index.html) page.

View File

@ -1,6 +1,6 @@
---
layout: "docs"
page_title: "MSSQL Database Plugin"
page_title: "MSSQL Database Plugin - Database Secret Backend"
sidebar_current: "docs-secrets-databases-mssql"
description: |-
The MSSQL plugin for Vault's Database backend generates database credentials to access Microsoft SQL Server.
@ -21,7 +21,7 @@ information about setting up the Database Backend.
After the Database Backend is mounted you can configure a MSSQL connection
by specifying this plugin as the `"plugin_name"` argument. Here is an example
configuration:
configuration:
```
$ vault write database/config/mssql \
@ -43,7 +43,7 @@ $ vault write database/roles/readonly \
GRANT SELECT ON SCHEMA::dbo TO [{{name}}];" \
default_ttl="1h" \
max_ttl="24h"
Success! Data written to: database/roles/readonly
```
@ -57,4 +57,3 @@ plugin API](/api/secret/databases/mssql.html) page.
For more information on the Database secret backend's HTTP API please see the [Database secret
backend API](/api/secret/databases/index.html) page.

View File

@ -1,6 +1,6 @@
---
layout: "docs"
page_title: "MySQL/MariaDB Database Plugin"
page_title: "MySQL/MariaDB Database Plugin - Database Secret Backend"
sidebar_current: "docs-secrets-databases-mysql-maria"
description: |-
The MySQL/MariaDB plugin for Vault's Database backend generates database credentials to access MySQL and MariaDB servers.
@ -19,7 +19,7 @@ This plugin has a few different instances built into vault, each instance is for
a slightly different MySQL driver. The only difference between these plugins is
the length of usernames generated by the plugin as different versions of mysql
accept different lengths. The available plugins are:
- mysql-database-plugin
- mysql-aurora-database-plugin
- mysql-rds-database-plugin
@ -32,7 +32,7 @@ information about setting up the Database Backend.
After the Database Backend is mounted you can configure a MySQL connection
by specifying this plugin as the `"plugin_name"` argument. Here is an example
configuration:
configuration:
```
$ vault write database/config/mysql \
@ -94,4 +94,4 @@ $ vault write database/roles/readonly \
creation_statements="Q1JFQVRFIFVTRVIgJ3t7bmFtZX19J0AnJScgSURFTlRJRklFRCBCWSAne3twYXNzd29yZH19JzsgR1JBTlQgU0VMRUNUIE9OIGBmb29hcHBcXyVgLiogVE8gJ3t7bmFtZX19J0AnJSc7" \
default_ttl="1h" \
max_ttl="24h"
```
```

View File

@ -1,6 +1,6 @@
---
layout: "docs"
page_title: "PostgreSQL Database Plugin"
page_title: "PostgreSQL Database Plugin - Database Secret Backend"
sidebar_current: "docs-secrets-databases-postgresql"
description: |-
The PostgreSQL plugin for Vault's Database backend generates database credentials to access PostgreSQL.
@ -21,7 +21,7 @@ information about setting up the Database Backend.
After the Database Backend is mounted you can configure a PostgreSQL connection
by specifying this plugin as the `"plugin_name"` argument. Here is an example
configuration:
configuration:
```
$ vault write database/config/postgresql \
@ -57,4 +57,3 @@ plugin API](/api/secret/databases/postgresql.html) page.
For more information on the Database secret backend's HTTP API please see the [Database secret
backend API](/api/secret/databases/index.html) page.