#vault (2020-01)
Discussions related to Hashicorp Vault
2020-01-13

I’m a bit confused by the AWS auth backend. Am I allowed to authenticate to Vault via AWS sts credentials from my local machine, or do I need to be on an EC2 when I assume a role so the metadata endpoint is present?
Essentially, is it possible to eventually say something like this on my local terminal: aws-vault exec sandbox-role -- vault login --method aws
and then vault kv read ...
?

Yes, you can totally use this on your local machine

(and it also works with the metadata endpoint, if you happen to be in EC2)

also, aws-vault
provides it’s own “mock” AWS metadata service if you use the --server
mode

We have some rough docs here on how we use it: https://docs.cloudposse.com/tools/aws-vault/

not sure if they will help you

That does help, thanks!
It looks like I can use https://www.terraform.io/docs/providers/vault/r/aws_auth_backend_role.html and do something like:
resource "vault_aws_auth_backend_role" "local_iam_user_role" {
role = "some_role_name"
auth_type = "iam"
bound_iam_principal_arns = ["arn:aws:iam::<account_id>:role/SomeRoleOnlyAdminsHaveAccessTo"]
token_policies = ["admin"]
}
and then use credentials from aws-vault for the the role SomeRoleOnlyAdminsHaveAccessTo
2020-01-30

A very blondie question… Vault… I’d assume you always want to firewall it? It’s anyway your secrets-API…

I’d say strongly recommended unless some extremely special case

:)
2020-01-31

How would one restart a vault server? Or otherwise, how could I apply new changes to the config hcl file?

For security reasons only some configs are updated with a SIGHUP
signal to vault proc, which will not restart it completely (and possibly seal vault if you do not have auto-unseal enabled): https://www.vaultproject.io/docs/configuration/
Some of the ones I know of are tls_cert_file
and tls_key_file
. Not sure about others ;(