151 Commits

Author SHA1 Message Date
Scott Miller
96498316f1
Seal HA documentation updates (#25316)
* Seal HA documentation updates

* anchor

* rel link

* remove beta

* try again on internal link

* still trying to get this internal redirect to work

* try without path
2024-02-08 16:00:50 -06:00
Jonathan Frappier
5b9cb33049
Fix typo in namespace API unlock (#25223) 2024-02-07 09:35:00 -08:00
Christopher Swenson
55d2dfb3d0
database: Emit event notifications (#24718)
Including for failures to write credentials and failure to rotate.
2024-02-05 10:30:00 -08:00
Brian Shumate
f130ebaeae
Docs/lease explosions update (#24770)
* Docs: lease explosions update

- Matching heading and title

* Support
2024-01-10 12:19:55 -05:00
Brian Shumate
4fc95853e8
Documentation: WAF: New lease explosions overview (#24683)
* feat: new doc for WAF: lease explosions

* Update website/content/docs/concepts/lease-explosions.mdx

Co-authored-by: Judith Malnick <judith@hashicorp.com>

* Update website/content/docs/concepts/lease-explosions.mdx

Co-authored-by: Judith Malnick <judith@hashicorp.com>

* Update website/content/docs/concepts/lease-explosions.mdx

Co-authored-by: Judith Malnick <judith@hashicorp.com>

* Update website/content/docs/concepts/lease-explosions.mdx

Co-authored-by: Judith Malnick <judith@hashicorp.com>

* Update website/content/docs/concepts/lease-explosions.mdx

Co-authored-by: Judith Malnick <judith@hashicorp.com>

* Update website/content/docs/concepts/lease-explosions.mdx

Co-authored-by: Judith Malnick <judith@hashicorp.com>

* Update website/content/docs/concepts/lease-explosions.mdx

Co-authored-by: Judith Malnick <judith@hashicorp.com>

* Updates based on feedback

* Updates based on feedback

---------

Co-authored-by: Judith Malnick <judith@hashicorp.com>
2024-01-09 11:34:45 -05:00
Steven Clark
fbb70eb0c6
Fix pluralization typo in ACME entity assignment doc (#24676) 2024-01-05 10:52:33 -05:00
Andy Assareh
ab2e0e5a28
typo corrections - spelling and grammar (#24625)
* typo corrections - spelling

* spelling and grammar
2024-01-04 12:50:42 -05:00
Sarah Chavis
1d8d80e8de
Remove invalid link (#24593) 2023-12-19 19:55:35 +00:00
Christopher Swenson
4980cb0fe1
Delete metadata-read event (#24568)
We never generated such an event. This was just a mistake when
I wrote the initial docs.
2023-12-18 10:23:01 -08:00
claire bontempo
2c19bbe145
Consistently refer to Key Value secrets engine as KV (#24529)
* VAULT-21427 change ui references from K/V to KV

* references in docs/

* website json data

* go command errors

* replace Key/Value with Key Value

* add changelog

* update test

* update secret list header badge

* two more test updates
2023-12-14 11:28:58 -08:00
ram-parameswaran
6a2ff07ba2
Document Vault Default Password Policy (#23939) 2023-12-13 13:31:12 -08:00
Steven Clark
b8050c518e
Quote example domains within ACME entity docs (#24508)
- The existing bare *.test.com triggered italics and stripped the *
   from the output
2023-12-13 12:45:28 -05:00
Steven Clark
e24301e32d
Update ACME entity assignment examples (#24501)
- Attempt to make the various examples for how we generate entity tokens when leveraging ACME clearer.
2023-12-13 12:21:50 -05:00
Steven Clark
479520c474
Specify within ACME client counting what are the certificate identifiers (#23738) 2023-10-19 15:00:36 -04:00
Scott Miller
ebef296c30
Be a bit more explicit about the need for two seals. (#23553)
* Be a bit more explicit about th need for two seals

* Add a mixture note
2023-10-06 11:29:17 -05:00
Sarah Chavis
8952b69eba
Make additional changes (#23416) 2023-09-28 17:24:12 -07:00
Scott Miller
036cbcebd9
First draft of Seal HA documentation (#23252)
* wip

* Initial draft of Seal HA docs

* nav data

* Fix env var name

* title

* Note partially wrapped values and disabled seal participation

* Update website/data/docs-nav-data.json

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* correct initial upgrade limitation

* Add note about shamir seals and migration

* fix nav json

* snapshot note

* availability note

* seal-backend-status

* Add a couple more clarifying statements

* header typo

* correct initial upgrade wording

* Update website/content/docs/configuration/seal/seal-ha.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/docs/concepts/seal.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-09-22 13:18:48 -05:00
Christopher Swenson
500cf21d0d
events: Update docs for beta release (#23036)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-13 14:18:18 -07:00
Sarah Chavis
bd3596610f
Add the appropriate enterprise alerts for seal wrapping (#22628) 2023-08-30 11:09:49 -07:00
Violet Hynes
2826be941f
Fix broken quotas metrics links (#22650) 2023-08-30 13:24:42 -04:00
Christopher Swenson
12fc5bed7c
Add subscribe capability to policies (#22474)
* Add `subscribe` capability to policies

... and `subscribe_event_types` to the policy body.

These are not currently enforced in the events system (as that
will require populating the full secrets path in the event).

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-08-22 18:07:32 +00:00
Kevin Wang
cbae51fdbc
docs: fix codeblock language (#22367) 2023-08-17 13:25:08 -07:00
Adrian Todorov
b49d668e6a
Clarify Tokens use and structure recommendation (#21569)
* Clarify Tokens use and structure recommendation

* Update website/content/docs/concepts/tokens.mdx

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-08-17 19:38:47 +00:00
Sarah Chavis
91face4eff
convert OSS language to "community" (#22343) 2023-08-15 13:31:52 -04:00
Tanmay Pereira Naik
2269369229
docs: Update outdated vaultproject.io/docs/ links (#22162)
Signed-off-by: Tanmay Pereira Naik <59953366+tanmay-pnaik@users.noreply.github.com>
Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
2023-08-15 12:59:34 -04:00
Max Bowsher
188bdca4bd
Fix sudo paths missing from OpenAPI and docs (#21772)
* Fix sudo paths missing from OpenAPI and docs

Various sudo (a.k.a. root-protected) paths are implemented in
non-standard ways, and as a result:

* are not declared as x-vault-sudo in the OpenAPI spec

* and as a result of that, are not included in the hardcoded patterns
  powering the Vault CLI `-output-policy` flag

* and in some cases are missing from the table of all sudo paths in the
  docs too

Fix these problems by:

* Adding `seal` and `step-down` to the list of root paths for the system
  backend. They don't need to be there for enforcement, as those two
  special endpoints bypass the standard request handling code, but they
  do need to be there for the OpenAPI generator to be able to know they
  require sudo.

  The way in which those two endpoints do things differently can be
  observed in the code search results for `RootPrivsRequired`:
  https://github.com/search?q=repo%3Ahashicorp%2Fvault%20RootPrivsRequired&type=code

* Fix the implementation of `auth/token/revoke-orphan` to implement
  endpoint sudo requirements in the standard way. Currently, it has an
  **incorrect** path declared in the special paths metadata, and then
  compensates with custom code throwing an error within the request
  handler function itself.

* changelog

* As discussed in PR, delete test which is just testing equality of a constant

* Restore sudo check as requested, and add comment

* Update vault/token_store.go

Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>

---------

Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
2023-07-19 16:28:17 +00:00
Sarah Chavis
a2de4c75cd
[Docs] Client count doc updates for ACME update in 1.14 (#21541)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
2023-07-07 08:32:31 -04:00
Anton Averchenkov
f4f0412b6a
[docs] Convert titles to sentense case (#21426)
* Convert documentation titles to sentense case

* Docker, Google, Foundry, Cloud proper case
2023-06-30 19:22:07 -04:00
Jonathan Frappier
c6970cd2fd
Add additional endpoints, remove non-protected endpoints (#20669)
* Add additional endpoints, remove non-protected endpoints

* Add step-down per engineering

* Match HTTP verb to individual doc pages

* Add /sys/internal/inspect/router to table

* Apply additional suggestions

* Updates based on engineering feedback

* Adding unsaved changes
2023-05-24 17:32:53 -04:00
Violet Hynes
f48c70a449
VAULT-15546 First pass at Vault Proxy docs (#20578)
* VAULT-15546 First pass at Vault Proxy docs

* VAULT-15546 correct errors

* VAULT-15546 fully qualify paths

* VAULT-15546 remove index

* VAULT-15546 Some typos and clean up

* VAULT-15546 fix link

* VAULT-15546 Add redirects so old links stay working

* VAULT-15546 more explicit redirects

* VAULT-15546 typo fixes

* Suggestions for Vault Agent & Vault Proxy docs (#20612)

* Rename 'agentandproxy' to 'agent-and-proxy' for better URL

* Update the index pages for each section

* VAULT-15546 fix link typo

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-19 13:11:39 -04:00
Jonathan Frappier
ef3db02198
Add root protected endpoint table (#20650)
* Add root protected endpoint table

* Fix heading case
2023-05-18 11:53:22 -04:00
Chip Stepowski
57791deb2f
Added note about Autopilot default values. (#19515)
* Added note about Autopilot default values.

* Update website/content/docs/concepts/integrated-storage/autopilot.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-03-30 16:30:29 -07:00
miagilepner
051e6fe25f
VAULT-14204 Update parameter policy documentation (#19586) 2023-03-17 11:14:54 +01:00
Ashlee M Boyer
55bf601122
Remove .mdx extension from link (#19514) 2023-03-13 15:03:06 -04:00
Christopher Swenson
46dd007b3a
docs: Add page about events (#19243)
This page details the new events experiment that will be
released in Vault 1.13.

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-02-21 16:43:34 +00:00
Bryce Kalow
79f6ff191c
update learn links to point to developer locations (#19026) 2023-02-06 20:34:51 -08:00
Scott Miller
70e74beb7a
Add a note that multi-cluster ENT setups can avoid this risk (#19024)
* wip

* all-seals

* typo

* add note about unreplicated items

* italics

* word-smithing
2023-02-06 19:25:14 -06:00
Scott Miller
40f599b11c
Add a stronger warning about the usage of recovery keys (#19011)
* Add a stronger warning about the usage of recovery keys

* Update website/content/docs/concepts/seal.mdx

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

* Keep the mitigation text in the warning box

---------

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2023-02-06 16:23:05 -06:00
Ashlee M Boyer
06df5b9d95
docs: Migrate link formats (#18696)
* Adding check-legacy-links-format workflow

* Adding test-link-rewrites workflow

* Updating docs-content-check-legacy-links-format hash

* Migrating links to new format

Co-authored-by: Kendall Strautman <kendallstrautman@gmail.com>
2023-01-25 16:12:15 -08:00
akshya96
dc95733f57
user-lockout documentation changes (#18478)
* added user-lockout documentation changes

* add changelog

* remove new lines

* changing method name

* changing lockedusers to locked-users

* Update website/content/docs/concepts/user-lockout.mdx

Co-authored-by: Meggie <meggie@hashicorp.com>

* Update website/content/api-docs/system/user-lockout.mdx

Co-authored-by: Meggie <meggie@hashicorp.com>

* Update website/content/api-docs/system/user-lockout.mdx

Co-authored-by: Meggie <meggie@hashicorp.com>

* Update website/content/partials/user-lockout.mdx

Co-authored-by: Meggie <meggie@hashicorp.com>

* Update website/content/partials/user-lockout.mdx

Co-authored-by: Meggie <meggie@hashicorp.com>

* adding suggested changes

* adding bullet points to disable

* Update website/content/api-docs/system/user-lockout.mdx

Co-authored-by: Josh Black <raskchanky@users.noreply.github.com>

* Update website/content/partials/user-lockout.mdx

Co-authored-by: Josh Black <raskchanky@users.noreply.github.com>

* Update website/content/docs/commands/auth/tune.mdx

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* Update website/content/docs/commands/auth/tune.mdx

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* Update website/content/docs/concepts/user-lockout.mdx

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

Co-authored-by: Meggie <meggie@hashicorp.com>
Co-authored-by: Josh Black <raskchanky@users.noreply.github.com>
Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>
2023-01-17 15:12:16 -08:00
mickael-hc
e367c5a280
docs: clarify parameter constraints limitations when using globs (#18593) 2023-01-04 15:58:27 -05:00
Jason O'Donnell
bc42a6cce8
docs/policies: update denied_parameters description (#18366) 2022-12-14 16:51:02 +00:00
Steven Zamborsky
8ea899588a
Vault Docs Autopilot Typo (#18307)
Replace the hyphens with underscores in the `disable_upgrade_migration` parameter.
2022-12-12 09:46:09 -05:00
Violet Hynes
a0a785f84a
VAULT-8336 Fix default rate limit paths (#18273)
* VAULT-8336 Fix default rate limit paths

* VAULT-8336 changelog
2022-12-09 08:49:17 -05:00
mickael-hc
b6db9de0ff
docs: detail policies parameter for auth methods using tokenutil (#18015)
* docs: detail policies parameter for auth methods using tokenutil

* Update website/content/partials/tokenfields.mdx


Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2022-11-18 11:09:29 -05:00
Chris Capurso
96d623d3fc
clarify that certain policy examples are for KVv1 (#17861) 2022-11-09 15:42:58 -05:00
dyma solovei
7c9cb891e7
chore: Update seal.mdx, use consistent terminology (#17767)
This article seems to use the terms "shares" and "shards" interchangeably to describe the parts in which the secret is split under SSS.
While both seem to be correct, sticking to one term would save a newbie reader (like myself) the confusion.  

Since the Wikipedia article that's linked in this article only mentions "shares" and the CLI flags (for recovery keys) also use `-shares`, I opted for that.
2022-11-02 13:58:04 -06:00
Yoko Hyakuna
de848b05b1
Added 'Manually Revocable' to the table (#17646) 2022-10-24 18:57:28 -07:00
Kapil Arora
6132327d9e
Updated Name reported by k8s auth (#15507)
Since 1.9 k8s auth method supports setting  Name reported by auth method to Service Account name which is not reflected in this doc

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2022-10-19 11:15:54 +01:00
Bryce Kalow
47875daf53
website: fixes redirected links (#17574)
* fixes redirected links

* fix broken link to key wrapping guide
2022-10-18 14:06:27 -04:00