-
### Terraform Version
```
Terraform v1.3.4
on linux_amd64
+ provider registry.terraform.io/hashicorp/aws v4.38.0
+ provider registry.terraform.io/hashicorp/vault v3.10.0
```
### Affected Re…
-
When using for example the aws secrets engine, deleting configuration entries for that secrets engine when enabling `purgeUnmanagedConfig` does not seem to be deleting them from vault.
From what I'…
-
### Use Case
We have a service wrapper for AWS secrets manager. As we add and update these secrets, which are used to validate client-specific access keys, we would like to create a vault and add th…
-
We have the latest vault installed in our k8s cluster via helm, and it is activated to in prometheus so we can scrape the metrics and get data from vault status in grafana. Usually it works fine. But …
-
Hi everyone!
I am trying to implement the AVP plugin using the sidecar but I am having some issues to connect it to Aws Secrets Manager.
The objective is to use the AVP to retrieve the secrets fro…
-
We're currently installing/configuring Vault as part of the AWS Quick-Start installation but the platform doesn't yet utilize Vault.
Should we remove it from the stack until such point when we'd li…
vdice updated
2 years ago
-
**Is your feature request related to a problem? Please describe.**
When assuming roles with profiles specified in config file (~/.aws/config), source identity cannot be specified.
**Describe the s…
vroad updated
2 weeks ago
-
`pulumi` CLI: v2.5.0
`@pulumi/vault`: v2.2.1
`@pulumi/aws`: v2.11.0
We have a setup where we retrieve credentials from external resources as configuration to our pulumi providers. Example belo…
-
First off, I searched for other similar requests and I couldn't find anything. I appologize if this has already been discussed and I missed it.
**Is your feature request related to a problem? Plea…
-
Hi,
I use a single AWS KMS key stored in us-east-1 region for all clusters that I run in different us regions.
This way everything works good, until I recently migrated from vault 1.14.0 on 1.15.1…