curl --header "X-Vault-Token: ${TOKEN}" http://192.168.7.70:8200/v1/sys/license | jq '.'
-
Use vagrant scripts to get vault and consul instances stood up.
-
Consul Server
| // ============================================================================= | |
| // Monthly Analytics Reporter | |
| // Stack: Google Apps Script + Gemini API | |
| // Trigger: 8:30 AM on the 1st of each month | |
| // | |
| // Setup steps: | |
| // 1. Run setupScriptProperties() once to store your config | |
| // 2. Run createMonthlyTrigger() once to register the time-based trigger | |
| // 3. Authorize the script when prompted | |
| // 4. That's it — it runs itself every month |
curl --header "X-Vault-Token: ${TOKEN}" http://192.168.7.70:8200/v1/sys/license | jq '.'
Use vagrant scripts to get vault and consul instances stood up.
Consul Server
Set of scripts to deploy locally, vault and configure TLS server and user certificates for testing TLS AUTH.
credit to @reard3n (https://github.com/reard3n) and @v6 (https://github.com/v6) for the gist this grew from
This was tested using Vagrant and Ubuntu
vault server --dev --dev-root-token-id="root" PreReq: export VAULT_ADDR=http://127.0.0.1:8200/ export VAULT_TOKEN=root
# Enable transit secrets engine
path "sys/mounts/transit" {
capabilities = [ "create", "read", "update", "delete", "list" ]
}
I hereby claim:
To claim this, I am signing this object: