Vault
HashiCorp Vault for secrets management. Store, access, and rotate credentials, tokens, and encryption keys securely.
35 commands
Browse by Topic
Start Vault dev server
Start Vault in development mode (insecure, for local testing only)
Set Vault address
Configure Vault CLI to connect to local dev server
Check Vault status
Display the current status of the Vault server
Write secret (KV v2)
Write a secret to KV v2 secrets engine.
Read secret
Read a secret from KV secrets engine.
Read specific field
Read a specific field from a secret.
List secrets
List secrets at a path.
Delete secret
Delete a secret (soft delete in v2).
Get secret metadata
Get secret metadata including versions.
Rollback to version
Rollback secret to a previous version.
Login with token
Authenticate using a Vault token.
Login with userpass
Login with username/password auth.
Enable auth method
Enable Kubernetes authentication method.
List auth methods
List enabled authentication methods.
Configure K8s auth
Configure Kubernetes auth method.
Write policy
Create policy from HCL file.
List policies
List all policies.
Read policy
Read a policy definition.
Delete policy
Delete a policy.
Create token
Create a new token with policy.
Lookup token
Look up current token information.
Renew token
Renew current token's lease.
Revoke token
Revoke a specific token.
Create periodic token
Create a periodic token for services.
Enable KV v2
Enable KV v2 secrets engine.
List secrets engines
List enabled secrets engines.
Enable transit
Enable transit encryption engine.
Enable PKI
Enable PKI secrets engine.
Disable engine
Disable a secrets engine.
Initialize Vault
Initialize a new Vault cluster.
Unseal Vault
Unseal Vault with unseal key.
Seal Vault
Seal Vault (emergency).
Check status
Check Vault server status.
Raft snapshot
Create a Raft storage snapshot.
Raft list peers
List Raft cluster peers.
Discussion
Loading comments...