176 Commits

Author SHA1 Message Date
Tommy Murphy
1c146a1012 telemetry: add stackdriver metrics sink (#6957)
* telemetry: add stackdriver metrics sink

* telemetry: stackdriver go mod tidy
2019-08-20 14:47:08 -07:00
Andre Hilsendeger
fa3e3960b2 docs: add connection options for MySQL storage backend (#7171) 2019-08-01 08:00:00 -07:00
Michel Vocks
8bcc19c618 Added s3 storage path parameter (#7157) 2019-07-24 12:48:26 -04:00
Mike Jarmy
be3e2a1288
Add 'log-format' CLI flag, along with associated config flag, for 'vault server' command. (#6840)
* Read config before creating logger when booting vault server

* Allow for specifying log output in JSON format in a config file, via a 'log_level' flag

* Create parser for log format flag

* Allow for specifying log format in a config file, via a 'log_format' flag. Also, get rid of 'log_json' flag.

* Add 'log-format' command line flag

* Update documentation to include description of log_format setting

* Tweak comment for VAULT_LOG_FORMAT environment variable

* add test for ParseEnvLogFormat()

* clarify how log format is set

* fix typos in documentation
2019-07-18 15:59:27 -04:00
Jason O'Donnell
bed75df086
doc: Add default SSL note to PG storage (#7125) 2019-07-18 14:37:24 -04:00
Justin Weissig
405670d4e7 docs: spelling (#6838)
Fixed minor spelling error: sychronized/synchronized.
2019-07-05 15:36:58 -07:00
Garrett T
8f6d2002f8 Set MaxIdleConns to reduce connection churn (postgresql physical) (#6967)
* Set MaxIdleConns to reduce connection churn (postgresql physical)

* Make new  "max_idle_connection" config option for physical postgresql

* Add docs for "max_idle_connections" for postgresql storage

* Add minimum version to docs for max_idle_connections
2019-07-02 15:03:56 -07:00
Vishal Nayak
c9ecbb663a
Raft Docs (#6966)
* Raft configuration doc

* API docs

* join sample

* Fix the Join API

* Add snapshot-force

* Update sys/storage subsection

* Use actual certs in examples

* Add sample configuration response

* Fix link

* remove TLS config options
2019-06-28 14:09:14 -04:00
Justin Weissig
8e992d7c3d docs: minor fixes to improve sentence flow (#6839) 2019-06-06 08:25:59 -07:00
Justin Weissig
a92c6342d5 docs: minor spelling fix (#6818)
Fixed spelling: PostgresSQL/PostgreSQL.
2019-06-04 02:28:44 -05:00
Justin Weissig
51787e4bd4 docs: fixed typos (#6809)
Fixed two typos: lifecyle + specfied.
2019-05-31 14:33:13 -05:00
Justin Weissig
a2e155b8d4 docs: spelling (#6799)
Fixed spelling: Specifiy/Specify.
2019-05-30 21:20:57 -05:00
Lexman
90ff541065
http timeout values are configurable (#6666)
* http timeout fields are configurable

* move return statement for server config tests outside of range loop

* adds documentation for configurable listener http_* values

* fixed some formatting for the docs markdown
2019-05-10 10:41:42 -07:00
bjorndolk
96e81be63c Added HA backend for postgres based on dynamodb model (#5731)
Add optional HA support for postgres backend if Postgres version >= 9.5.
2019-05-10 12:48:42 -04:00
Peter Souter
14537fbe7b Adds docs for session_token for awskms (#6691) 2019-05-07 08:27:06 -07:00
Mark Gritter
f3558fc35c
Correct type for tls_skip_verify
Parses as boolean but needs to be represented as a string in configuration.
2019-05-06 16:02:36 -05:00
Mark Gritter
de0060e824
fix typo 2019-05-03 17:21:58 -05:00
Russ Parsloe
3acee2608f azurekeyvault doc fixed typos (#6663) 2019-05-01 13:37:01 -07:00
Justin Weissig
5c211c47ed
Fixed Typo
Fixed typo: recomended/recommended.
2019-05-01 00:24:59 -07:00
Becca Petrin
8d7d80bb28 Merge branch 'opensource-master' into 6234-aws-region 2019-04-03 11:37:33 -07:00
Naoki Ainoya
f3edfcfef9 fix typo in gcpckms.html.md, cloudkms.cryptoKeys.get (#6515)
ref: https://github.com/hashicorp/vault/pull/6327/files#r270674452
2019-04-02 10:45:23 -07:00
Jim Kalafut
dd12ffd15c
Clarify config option wording (#6503)
Fixes #6123
2019-04-01 16:14:12 -07:00
Becca Petrin
043ca6263e merge master 2019-04-01 13:52:44 -07:00
Matias Ozdy
3b0bb64c2a Add missing = in dynamodb_table tf (#6493) 2019-03-28 08:24:56 -07:00
Thomas Kula
061c390009 Small typo fix to transit.html.md (#6482) 2019-03-26 17:32:26 -05:00
Sean Malloy
ffd437aa60 Add Docs For Prometheus Metrics (#6434)
Prometheus metrics were added as part of the Vault v1.1.0 release in PR #5308.
But no documentation was created. Adds the telemetry configuration docs and
the API docs.
2019-03-23 16:53:43 -05:00
Yoko
3e12bc1dec policy capabilities: write --> update (#6373) 2019-03-07 16:34:47 -05:00
Becca Petrin
74037a92d0 merge master 2019-03-05 09:39:53 -08:00
Chris Hoffman
8b4e30c1a1
Transit Auto Seal Docs (#6332)
* adding transit seal docs

* add missing backtick
2019-03-05 08:45:44 -05:00
Naoki Ainoya
bead976466 fix doc to add missing permission to use gcpkms seal (#6327) 2019-03-04 11:46:06 -05:00
Becca Petrin
b7eb95e52d
Merge pull request #6224 from hashicorp/dp.fix-consul-storage-doc-6171
Fix example in documentation. Resolves [issue 6171]
2019-02-28 09:55:55 -08:00
Becca Petrin
73a2280626
Support env vars for STS region (#6284) 2019-02-28 09:31:06 -08:00
Andrey Kuzmin
4bd2a6a305 Etcd timeouts (#6285)
* Configurable lock and request etcd timeouts.

If etcd cluster placed on slow servers - request timeouts may be much greater, then hardcoded default values.
Also, in etcd setup, like above - may be need to greater lock timeout.

* Configurable lock and request etcd timeouts.

Docs.

* Use user friendly timeout syntax.

To allow specify more readable time values.
2019-02-27 18:34:29 -08:00
dp-h
9900b6709b Revert "Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171]"
This reverts commit 7726fdd1aaf7848dc5af9d4867e76bd1588f7bac.

Revert to go through proper PR. Apologies.
2019-02-14 13:40:17 -07:00
Brian Shumate
a4b63b5187 Update configuration/listener documentation (#6228)
- Clarify that PROXY protocol version 1 is currently supported
- Add missing backtick to fix formatting issue
2019-02-13 09:27:05 -05:00
dp-h
7726fdd1aa Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171] 2019-02-12 17:05:31 -07:00
dominic
7a380c71e3 Revert "Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171]"
This reverts commit b275f2a1e6d74400bb3cf702d1e03c90d31624cb.

Pushed to master, my apologies. Will do proper PR for this.
2019-02-12 16:49:34 -07:00
dominic
b275f2a1e6 Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171] 2019-02-12 16:47:17 -07:00
Graham Land
1c2c8fad34 Add Vault supported log levels (#6185)
Documentation : Add the supported log level configurations

`Supported log levels: Trace, Debug, Error, Warn, Info.`
2019-02-07 11:27:08 -08:00
d
33b18b24b0 Revert "fixed trailing slash in consul.html.md example"
This reverts commit 4310bb58c83285ebd9cfcb302b70d1db432a11e2.

Accidental push to master, my apologies. See PR https://github.com/hashicorp/vault/pull/6175
2019-02-05 17:42:15 -07:00
Dominic Porreco
4310bb58c8 fixed trailing slash in consul.html.md example 2019-02-05 17:01:39 -07:00
Jeff Mitchell
0569b7fe5b Remove regenerate-key docs as it no longer exists 2019-02-01 09:29:40 -05:00
Gordon Shankman
91a37b23cc Adding support for SSE in the S3 storage backend. (#5996) 2019-01-26 16:48:08 -05:00
Jeff Mitchell
a8b3bc9301
Update to latest etcd and use the new repository packages (#6087)
This will be necessary for go mod work

Additionally, the srv api has changed. This adapts to it.
2019-01-23 14:35:03 -05:00
Julien Blache
29471c88e9 FoundationDB backend TLS support and housekeeping (#5800)
* Fix typo in documentation

* Update fdb-go-install.sh for new release tags

* Exclude FoundationDB bindings from vendoring, delete vendored copy

FoundationDB bindings are tightly coupled to the server version and
client library version used in a specific deployment. Bindings need
to be installed using the fdb-go-install.sh script, as documented in
the foundationdb backend documentation.

* Add TLS support to FoundationDB backend

TLS support appeared in FoundationDB 5.2.4, raising the minimum API version
for TLS-aware FoundationDB code to 520.

* Update documentation for FoundationDB TLS support
2019-01-08 09:01:44 -08:00
Seth Vargo
9293594176 Reduce required permissions for the GCPCKMS auto-unsealer (#5999)
This changes the behavior of the GCPCKMS auto-unsealer setup to attempt
encryption instead of a key lookup. Key lookups are a different API
method not covered by roles/cloudkms.cryptoKeyEncrypterDecrypter. This
means users must grant an extended scope to their service account
(granting the ability to read key data) which only seems to be used to
validate the existence of the key.

Worse, the only roles that include this permission are overly verbose
(e.g. roles/viewer which gives readonly access to everything in the
project and roles/cloudkms.admin which gives full control over all key
operations). This leaves the user stuck between choosing to create a
custom IAM role (which isn't fun) or grant overly broad permissions.

By changing to an encrypt call, we get better verification of the unseal
permissions and users can reduce scope to a single role.
2019-01-04 16:29:31 -05:00
Becca Petrin
d2789f4000
Merge pull request #5892 from jen20/jen20/dynamodb-capacity-doc
docs: Clarify the utility of DynamoDB capacities
2018-12-20 11:54:26 -08:00
Jeff Mitchell
dd459e0d16 Update Consul ACL example
Fixes #5831
2018-12-13 17:18:28 -05:00
Matthew Irish
af78f40cf8
change ui url so that it includes the trailing slash (#5890) 2018-12-05 12:25:16 -06:00
Chris Hoffman
a05d2a7aba
removing beta tag (#5904) 2018-12-05 10:45:22 -05:00