tpl/gcp/docs/vault.md in kite-0.0.9 vs tpl/gcp/docs/vault.md in kite-0.1.0

- old
+ new

@@ -14,11 +14,11 @@ To deploy Vault, use `./bin/vault-deploy.sh` ### Connection -- Export your Vault's IP using `export VAULT_ADDR=*vault_ip*` +- Export your Vault's IP using `export VAULT_ADDR=http://*vault_ip*:8200` - Run `vault init` to initialize the vault - Store the keys displayed after init - Unseal the vault by running `vault unseal` three times using three keys from the previous step - Authenticate to the vault with `vault auth` using the root token you got from `vault init` @@ -29,5 +29,7 @@ ### Usage with Concourse Before using Vault with Concourse you should mount a secrets backend with `vault mount -path=concourse kv` To add new secrets accessible for Concourse use `vault write concourse/main/*secret_name* value="*secret_value*"` + +#### It's recommended to create a separate token for Concourse by using `vault token-create`