tpl/aws/docs/vault.md in kite-0.0.9 vs tpl/aws/docs/vault.md in kite-0.1.0
- old
+ new
@@ -14,11 +14,11 @@
To deploy Vault, use `./bin/vault-deploy.sh`
### Connection
-- Export your Vault's IP using `export VAULT_ADDR=*vault_ip*`
+- Export your Vault's IP using `export VAULT_ADDR=http://*vault_ip*:8200`
- Run `vault init` to initialize the vault
- Store the keys displayed after init
- Unseal the vault by running `vault unseal` three times using three keys from the previous step
- Authenticate to the vault with `vault auth` using the root token you got from `vault init`
@@ -29,5 +29,7 @@
### Usage with Concourse
Before using Vault with Concourse you should mount a secrets backend with `vault mount -path=concourse kv`
To add new secrets accessible for Concourse use `vault write concourse/main/*secret_name* value="*secret_value*"`
+
+#### It's recommended to create a separate token for Concourse by using `vault token-create`