201 Commits

Author SHA1 Message Date
Michael Golowka
dcdc75b39e
Docs: Update MongoDB to support root credential rotation (#9559)
* Update MongoDB to support root credential rotation
2020-07-22 14:56:11 -06:00
Mark Gritter
edfb9c7ee8
Fix links to documentation. (#9570)
* Fix links to documentation.
* Add 1.5.0 upgrade nodes to navigation.
2020-07-22 15:55:41 -05:00
ncabatoff
2519b6c182
Add upgrade note for #9555. (#9569) 2020-07-22 16:24:06 -04:00
Mark Gritter
8b78cb8d0f
Add upgrade note for #9553. (#9563)
* Add upgrade note for #9553.
* Note that these are metrics introduced in 1.5.0.
* Added link to docs.
2020-07-22 14:47:48 -05:00
Alexander Bezobchuk
853d358e8c
Merge PR #9089: Initial 1.5.0 Upgrade Doc 2020-07-22 15:23:02 -04:00
Austin Gebauer
07e7122e78
Adds documentation for OIDC provider specific extension for G Suite (#9454)
* docs: adds documentation for JWT/OIDC google provider specific handling

* use may instead of will for identity group alias association

Co-authored-by: Jim Kalafut <jkalafut@hashicorp.com>

* adds missed parentheses

Co-authored-by: Jim Kalafut <jkalafut@hashicorp.com>

* adds missed parentheses

Co-authored-by: Jim Kalafut <jkalafut@hashicorp.com>

* reword sentence referring to key file for Google service account

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>

* add styles to emphasize security step

Co-authored-by: Jim Kalafut <jkalafut@hashicorp.com>
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2020-07-22 12:18:58 -07:00
Scott Miller
e45018a169
Add sentinel configuration stanza documentation to OSS (#9558) 2020-07-22 13:07:51 -05:00
Austin Gebauer
63bc5ff1ea
docs: specify which JWT/OIDC role params support JSON pointer syntax in API docs (#9518) 2020-07-21 11:20:10 -07:00
Jason O'Donnell
98566e9ec6
doc: add k8s probe notes to helm doc (#9543) 2020-07-21 12:40:43 -04:00
Meggie
76dd651cd1
docs: add release notes (#9540)
* Create nav for release notes

* Update 1.5.0.mdx

Initial release notes

* Update 1.5.0.mdx

Minor edits

* Update 1.5.0.mdx

Made a small grammatical edit

* Update 1.5.0.mdx

Changed a period to a colon

* Update 1.5.0.mdx

Some minor formatting changes

* Update 1.5.0.mdx

Changes to the Splunk app description

* Update 1.5.0.mdx

Small change to the vault monitor command description

* Update 1.5.0.mdx

Small change to the description of the vault monitor command

* Update 1.5.0.mdx

Added link to the Splunk app for Monitoring Vault

* Updating version

* Capitalization consistency

Co-authored-by: Andy Manoske <andy@hashicorp.com>
Co-authored-by: Darshana Sivakumar <darshana10@gmail.com>
2020-07-21 12:23:03 -04:00
Jason O'Donnell
ef9fd977c3
doc: remove beta warnings for openshift (#9541) 2020-07-21 10:43:41 -04:00
Scott Miller
01eda07010
API and upgrade docs for global plugin reload (#9487) 2020-07-17 13:39:24 -05:00
Austin Gebauer
7e45be5730
Replaces storage backend with secrets engine in the gcp secrets docs (#9511) 2020-07-16 17:43:47 -07:00
Alexander Bezobchuk
0756ec4492
Merge PR #9502: Resource Quotas: Remove 'burst' Param from Rate Limiter 2020-07-16 14:34:43 -04:00
Mike Jarmy
b557b76ac1
Update the seal migration docs (#9432)
* update the seal migration docs

* Update website/pages/docs/concepts/seal.mdx

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>
2020-07-15 11:55:28 -04:00
Theron Voran
4c44ccd52a
docs: Updating vault-helm service_registration docs (#9417)
* Adding notes about ingress and route requirements

Specifically that they require vault 1.4 with service_registration
enabled. Also removed a stray block about extraVolumes.
2020-07-10 13:02:51 -07:00
Michael Golowka
695b117cc0
Add links to API docs (#9442) 2020-07-10 12:55:43 -06:00
Mark Gritter
2affcd1823
Documentation fixes on metric names (#9419)
Make the names of WAL metrics exactly match their implementation.
Add `vault` prefix to be consistent everywhere.

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>
2020-07-08 13:16:42 -05:00
Larry Eichenbaum
f28b65a1c9
Document OSS->ENT upgrade process (#9414) 2020-07-08 09:17:27 -04:00
Michael Golowka
9f554d3d12
Update GCP auth docs with warning about token impersonation (#9418) 2020-07-07 17:09:12 -06:00
Alexander Bezobchuk
9881e7c09a
Merge PR #9342: Resource Quotas Doc 2020-07-07 11:42:01 -04:00
Trishank Karthik Kuppusamy
c99a97533c
Merge PR #9388: Update tokens.mdx 2020-07-06 09:22:50 -04:00
DevOps Rob
127da9c57e
adding a note to the docs to make it clear that the token needs to be unlimited to create child tokens (#9397) 2020-07-03 09:00:14 -07:00
Geoffrey Grosenbach
a1a6584988
Mention Linux packages on install page (#9314)
* Update install docs to mention Linux packages

We now build packages for Debian, Ubuntu, CentOS, etc. This removes language
about "we have no plans to build packages" and adds links to step by step guides
for adding a GPG key and the official repository.

* Fix URL to Learn Vault install page

A Linux section previously existed but now it is in the general install section.

* Fix Markdown for multi-step compile from source

The steps were previously marked up as an ordered list but the numbers didn't
display correctly. This outdents the code so it's a series of paragraphs instead
of an ordered list.
2020-07-02 13:51:02 -04:00
Roger Berlind
c0097ddbfd
request.connection.remote_addr only has IP (#9326)
* request.connection.remote_addr only has IP

The request.connection.remote_addr property exposed to Sentinel only has an IP.
It does not include a port.
I tested this in a policy with `print("remote address:", request.connection.remote_addr)` and got back 150.10.0.26.

* Update website/pages/docs/enterprise/sentinel/properties.mdx

Co-authored-by: Calvin Leung Huang <cleung2010@gmail.com>

Co-authored-by: Calvin Leung Huang <cleung2010@gmail.com>
2020-07-02 10:47:44 -07:00
Josh Black
c62b7507de
Add docs for vault monitor (#9218) 2020-06-29 12:23:31 -07:00
Theron Voran
a5728fb8dd
Adding docs for azure-specific handling in jwt-oidc (#9287)
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2020-06-29 10:46:41 -07:00
Vitaly Velikodny
fbd5e36194
fix #8092: add the note to docs about impossible to create a custom token with 's.' prefix (#8195)
Co-authored-by: Vishal Nayak <vishalnayak@users.noreply.github.com>
2020-06-29 12:20:23 -04:00
Josh Black
8b4116eada
Update documentation with more details for allowed_parameters (#9279) 2020-06-29 09:01:33 -07:00
Vishal Nayak
c68e270863
Resource Quotas: Rate Limiting (#9330) 2020-06-26 17:13:16 -04:00
Theron Voran
836fad05c7
docs: default for the auth-path annotation (#9313)
Updating the default for the auth-path annotation in the k8s injector
docs.
2020-06-25 09:36:23 -07:00
Jason O'Donnell
e3fccc1c02
doc: update vault helm enterprise image examples (#9299)
* doc: update vault helm enterprise image examples

* fix tar reference
2020-06-23 16:20:34 -04:00
Calvin Leung Huang
045836da71
raft: add support for using backend for ha_storage (#9193)
* raft: initial work on raft ha storage support

* add note on join

* add todo note

* raft: add support for bootstrapping and joining existing nodes

* raft: gate bootstrap join by reading leader api address from storage

* raft: properly check for raft-only for certain conditionals

* raft: add bootstrap to api and cli

* raft: fix bootstrap cli command

* raft: add test for setting up new cluster with raft HA

* raft: extend TestRaft_HA_NewCluster to include inmem and consul backends

* raft: add test for updating an existing cluster to use raft HA

* raft: remove debug log lines, clean up verifyRaftPeers

* raft: minor cleanup

* raft: minor cleanup

* Update physical/raft/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/ha.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/ha.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/logical_system_raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* address feedback comments

* address feedback comments

* raft: refactor tls keyring logic

* address feedback comments

* Update vault/raft.go

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* address feedback comments

* testing: fix import ordering

* raft: rename var, cleanup comment line

* docs: remove ha_storage restriction note on raft

* docs: more raft HA interaction updates with migration and recovery mode

* docs: update the raft join command

* raft: update comments

* raft: add missing isRaftHAOnly check for clearing out state set earlier

* raft: update a few ha_storage config checks

* Update command/operator_raft_bootstrap.go

Co-authored-by: Vishal Nayak <vishalnayak@users.noreply.github.com>

* raft: address feedback comments

* raft: fix panic when checking for config.HAStorage.Type

* Update vault/raft.go

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* Update website/pages/docs/commands/operator/raft.mdx

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* raft: remove bootstrap cli command

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* raft: address review feedback

* raft: revert vendored sdk

* raft: don't send applied index and node ID info if we're HA-only

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>
Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>
Co-authored-by: Vishal Nayak <vishalnayak@users.noreply.github.com>
2020-06-23 12:04:13 -07:00
Mark Gritter
fb0924dee3
Document new and previously undocumented telemetry metrics: (#9283)
usage metrics
 vault.route.*
 vault.core.unsealed
2020-06-23 13:49:45 -05:00
Calvin Leung Huang
7894769cf5
docs: add additional info around transform for tweak and template type (#9203) 2020-06-23 10:32:54 -07:00
Austin Gebauer
48bd627218
docs: clarify when plugin executables must also be given mlock syscall ability (#9275) 2020-06-22 10:05:15 -07:00
Johnathan Schmidt
054eec2671
Add the static-roles feature for MSSQL (#9062) 2020-06-19 23:01:06 -07:00
Scott Miller
2648713fcd
Add new Telemetry config options (#9238)
* Add new Telemetry config options

Add cluster_name, maximum_gauge_cardinality, and usage_gauge_period
configuration options to the config stanza.

Update unit tests.

Document.

Co-authored-by: Mark Gritter <mgritter@hashicorp.com>
2020-06-17 10:07:33 -05:00
Jason O'Donnell
cbd1369f0f
docs/agent: add overview for consul template fetches (#9227)
* docs/vault-k8s: add overview for consul template fetches

* Add dynamic role link

* move to agent documentation, add link

* fix typo in certificate doc

* fix note about leased secrets

* update secret vs token, add note to pki

* add more secret vs token notes

* add note about caching
2020-06-15 15:49:35 -04:00
Austin Gebauer
d8884e44b3
docs: fix typo in gcp and gcpkms secrets (#9228) 2020-06-15 11:57:51 -07:00
Matt Whiteley
f360b2be4e
Fix typo (#9217)
correct parameter is `leader_ca_cert_file`
2020-06-15 14:36:15 -04:00
Michael Golowka
6a934e26e5
Add password policies to Active Directory secret engine (#9144)
* Also updates AD docs to reflect password policies
2020-06-15 10:36:17 -06:00
Jim Kalafut
60aef2b51c
Minor transform docs rewording (#9223) 2020-06-14 20:53:36 -07:00
Michael Golowka
b2441efd37
Integrate password policies into RabbitMQ secret engine (#9143)
* Add password policies to RabbitMQ & update docs
* Also updates some parts of the password policies to aid/fix testing
2020-06-11 16:08:20 -06:00
ncabatoff
8cabb11b48
Clarify cache setting. (#9204) 2020-06-11 16:20:36 -04:00
Andy Assareh
40ca742040
replacing "a key usage mode" as it is confusing (#9194)
Since the context of this page is transit and encryption keys, the use of the word "key" to mean effectively common seems ill advised. Proposing an alternative wording.
2020-06-11 07:50:31 -04:00
Theron Voran
b792adb9a1
AWS: Add iam_groups parameter to role create/update (#8811)
Allows vault roles to be associated with IAM groups in the AWS
secrets engine, since IAM groups are a recommended way to manage
IAM user policies. IAM users generated against a vault role will
be added to the IAM Groups. For a credential type of
`assumed_role` or `federation_token`, the policies sent to the
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will
be the policies from each group in `iam_groups` combined with the
`policy_document` and `policy_arns` parameters.

Co-authored-by: Jim Kalafut <jkalafut@hashicorp.com>
2020-06-09 16:56:12 -07:00
Rob Taylor
62546708b4
Fixed minor typo in secrets documentation page (#8856) 2020-06-08 11:17:26 -04:00
Frederic Hemberger
49461d66a9
[docs/telemetry] Unnecessary comma in HCL example (#8817) 2020-06-08 11:07:28 -04:00
Rob Jackson
8bd298f0f5
update to include vault_format (#8876) 2020-06-08 10:40:03 -04:00