All checks were successful
test-build / guarddog (push) Successful in 2m14s
test-build / build (push) Successful in 2m17s
release-image / guarddog (push) Successful in 45s
release-image / build (push) Successful in 1m42s
release-image / semantic-release (push) Successful in 48s
release-image / release-harbor (push) Successful in 8m54s
release-image / release-gitea (push) Successful in 3m20s
renovate / renovate (push) Successful in 1m22s
32 lines
1.1 KiB
Plaintext
32 lines
1.1 KiB
Plaintext
---
|
|
title: Vault
|
|
description: A tool for secrets management, encryption as a service, and privileged access management.
|
|
hero:
|
|
tagline: A tool for secrets management, encryption as a service, and privileged access management.
|
|
image:
|
|
file: https://cdn.jsdelivr.net/gh/selfhst/icons@main/webp/hashicorp-vault.webp
|
|
actions:
|
|
- text: Source
|
|
link: https://github.com/hashicorp/vault
|
|
icon: right-arrow
|
|
- text: Deployment Chart
|
|
link: https://gitea.alexlebens.dev/alexlebens/infrastructure/src/branch/main/clusters/cl01tl/helm/vault
|
|
icon: right-arrow
|
|
---
|
|
|
|
import { Aside } from '@astrojs/starlight/components';
|
|
|
|
<Aside type="tip">Has an internal [Grafana Dashboard](https://grafana.alexlebens.net/goto/bfit8f62ducjkd?orgId=1).</Aside>
|
|
|
|
# Purpose
|
|
|
|
Secrets manager.
|
|
|
|
# Notes
|
|
|
|
Retrieved by [External Secrets](https://docs.alexlebens.dev/applications/external-secrets/) for making them availible in cluster.
|
|
|
|
Can store other secrets, but primarily used for cluster secrets.
|
|
|
|
And by 'secrets' this means passwords, keys, etc, that are confidential and non public.
|