vault.kmip.SecretBackend
Explore with Pulumi AI
Manages KMIP Secret backends in a Vault server. This feature requires Vault Enterprise. See the Vault documentation for more information.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const _default = new vault.kmip.SecretBackend("default", {
path: "kmip",
description: "Vault KMIP backend",
listenAddrs: [
"127.0.0.1:5696",
"127.0.0.1:8080",
],
tlsCaKeyType: "rsa",
tlsCaKeyBits: 4096,
defaultTlsClientKeyType: "rsa",
defaultTlsClientKeyBits: 4096,
defaultTlsClientTtl: 86400,
});
import pulumi
import pulumi_vault as vault
default = vault.kmip.SecretBackend("default",
path="kmip",
description="Vault KMIP backend",
listen_addrs=[
"127.0.0.1:5696",
"127.0.0.1:8080",
],
tls_ca_key_type="rsa",
tls_ca_key_bits=4096,
default_tls_client_key_type="rsa",
default_tls_client_key_bits=4096,
default_tls_client_ttl=86400)
package main
import (
"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kmip"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := kmip.NewSecretBackend(ctx, "default", &kmip.SecretBackendArgs{
Path: pulumi.String("kmip"),
Description: pulumi.String("Vault KMIP backend"),
ListenAddrs: pulumi.StringArray{
pulumi.String("127.0.0.1:5696"),
pulumi.String("127.0.0.1:8080"),
},
TlsCaKeyType: pulumi.String("rsa"),
TlsCaKeyBits: pulumi.Int(4096),
DefaultTlsClientKeyType: pulumi.String("rsa"),
DefaultTlsClientKeyBits: pulumi.Int(4096),
DefaultTlsClientTtl: pulumi.Int(86400),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var @default = new Vault.Kmip.SecretBackend("default", new()
{
Path = "kmip",
Description = "Vault KMIP backend",
ListenAddrs = new[]
{
"127.0.0.1:5696",
"127.0.0.1:8080",
},
TlsCaKeyType = "rsa",
TlsCaKeyBits = 4096,
DefaultTlsClientKeyType = "rsa",
DefaultTlsClientKeyBits = 4096,
DefaultTlsClientTtl = 86400,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.kmip.SecretBackend;
import com.pulumi.vault.kmip.SecretBackendArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var default_ = new SecretBackend("default", SecretBackendArgs.builder()
.path("kmip")
.description("Vault KMIP backend")
.listenAddrs(
"127.0.0.1:5696",
"127.0.0.1:8080")
.tlsCaKeyType("rsa")
.tlsCaKeyBits(4096)
.defaultTlsClientKeyType("rsa")
.defaultTlsClientKeyBits(4096)
.defaultTlsClientTtl(86400)
.build());
}
}
resources:
default:
type: vault:kmip:SecretBackend
properties:
path: kmip
description: Vault KMIP backend
listenAddrs:
- 127.0.0.1:5696
- 127.0.0.1:8080
tlsCaKeyType: rsa
tlsCaKeyBits: 4096
defaultTlsClientKeyType: rsa
defaultTlsClientKeyBits: 4096
defaultTlsClientTtl: 86400
Create SecretBackend Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecretBackend(name: string, args: SecretBackendArgs, opts?: CustomResourceOptions);
@overload
def SecretBackend(resource_name: str,
args: SecretBackendArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SecretBackend(resource_name: str,
opts: Optional[ResourceOptions] = None,
path: Optional[str] = None,
namespace: Optional[str] = None,
default_tls_client_ttl: Optional[int] = None,
description: Optional[str] = None,
disable_remount: Optional[bool] = None,
listen_addrs: Optional[Sequence[str]] = None,
default_tls_client_key_bits: Optional[int] = None,
default_tls_client_key_type: Optional[str] = None,
server_hostnames: Optional[Sequence[str]] = None,
server_ips: Optional[Sequence[str]] = None,
tls_ca_key_bits: Optional[int] = None,
tls_ca_key_type: Optional[str] = None,
tls_min_version: Optional[str] = None)
func NewSecretBackend(ctx *Context, name string, args SecretBackendArgs, opts ...ResourceOption) (*SecretBackend, error)
public SecretBackend(string name, SecretBackendArgs args, CustomResourceOptions? opts = null)
public SecretBackend(String name, SecretBackendArgs args)
public SecretBackend(String name, SecretBackendArgs args, CustomResourceOptions options)
type: vault:kmip:SecretBackend
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var examplesecretBackendResourceResourceFromKmipsecretBackend = new Vault.Kmip.SecretBackend("examplesecretBackendResourceResourceFromKmipsecretBackend", new()
{
Path = "string",
Namespace = "string",
DefaultTlsClientTtl = 0,
Description = "string",
DisableRemount = false,
ListenAddrs = new[]
{
"string",
},
DefaultTlsClientKeyBits = 0,
DefaultTlsClientKeyType = "string",
ServerHostnames = new[]
{
"string",
},
ServerIps = new[]
{
"string",
},
TlsCaKeyBits = 0,
TlsCaKeyType = "string",
TlsMinVersion = "string",
});
example, err := kmip.NewSecretBackend(ctx, "examplesecretBackendResourceResourceFromKmipsecretBackend", &kmip.SecretBackendArgs{
Path: pulumi.String("string"),
Namespace: pulumi.String("string"),
DefaultTlsClientTtl: pulumi.Int(0),
Description: pulumi.String("string"),
DisableRemount: pulumi.Bool(false),
ListenAddrs: pulumi.StringArray{
pulumi.String("string"),
},
DefaultTlsClientKeyBits: pulumi.Int(0),
DefaultTlsClientKeyType: pulumi.String("string"),
ServerHostnames: pulumi.StringArray{
pulumi.String("string"),
},
ServerIps: pulumi.StringArray{
pulumi.String("string"),
},
TlsCaKeyBits: pulumi.Int(0),
TlsCaKeyType: pulumi.String("string"),
TlsMinVersion: pulumi.String("string"),
})
var examplesecretBackendResourceResourceFromKmipsecretBackend = new SecretBackend("examplesecretBackendResourceResourceFromKmipsecretBackend", SecretBackendArgs.builder()
.path("string")
.namespace("string")
.defaultTlsClientTtl(0)
.description("string")
.disableRemount(false)
.listenAddrs("string")
.defaultTlsClientKeyBits(0)
.defaultTlsClientKeyType("string")
.serverHostnames("string")
.serverIps("string")
.tlsCaKeyBits(0)
.tlsCaKeyType("string")
.tlsMinVersion("string")
.build());
examplesecret_backend_resource_resource_from_kmipsecret_backend = vault.kmip.SecretBackend("examplesecretBackendResourceResourceFromKmipsecretBackend",
path="string",
namespace="string",
default_tls_client_ttl=0,
description="string",
disable_remount=False,
listen_addrs=["string"],
default_tls_client_key_bits=0,
default_tls_client_key_type="string",
server_hostnames=["string"],
server_ips=["string"],
tls_ca_key_bits=0,
tls_ca_key_type="string",
tls_min_version="string")
const examplesecretBackendResourceResourceFromKmipsecretBackend = new vault.kmip.SecretBackend("examplesecretBackendResourceResourceFromKmipsecretBackend", {
path: "string",
namespace: "string",
defaultTlsClientTtl: 0,
description: "string",
disableRemount: false,
listenAddrs: ["string"],
defaultTlsClientKeyBits: 0,
defaultTlsClientKeyType: "string",
serverHostnames: ["string"],
serverIps: ["string"],
tlsCaKeyBits: 0,
tlsCaKeyType: "string",
tlsMinVersion: "string",
});
type: vault:kmip:SecretBackend
properties:
defaultTlsClientKeyBits: 0
defaultTlsClientKeyType: string
defaultTlsClientTtl: 0
description: string
disableRemount: false
listenAddrs:
- string
namespace: string
path: string
serverHostnames:
- string
serverIps:
- string
tlsCaKeyBits: 0
tlsCaKeyType: string
tlsMinVersion: string
SecretBackend Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SecretBackend resource accepts the following input properties:
- Path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - Default
Tls intClient Key Bits - Client certificate key bits, valid values depend on key type.
- Default
Tls stringClient Key Type - Client certificate key type,
rsa
orec
. - Default
Tls intClient Ttl - Client certificate TTL in seconds
- Description string
- A human-friendly description for this backend.
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Listen
Addrs List<string> - Addresses the KMIP server should listen on (
host:port
). - Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Server
Hostnames List<string> - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- Server
Ips List<string> - IPs to include in the server's TLS certificate as SAN IP addresses.
- Tls
Ca intKey Bits - CA key bits, valid values depend on key type.
- Tls
Ca stringKey Type - CA key type, rsa or ec.
- Tls
Min stringVersion - Minimum TLS version to accept.
- Path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - Default
Tls intClient Key Bits - Client certificate key bits, valid values depend on key type.
- Default
Tls stringClient Key Type - Client certificate key type,
rsa
orec
. - Default
Tls intClient Ttl - Client certificate TTL in seconds
- Description string
- A human-friendly description for this backend.
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Listen
Addrs []string - Addresses the KMIP server should listen on (
host:port
). - Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Server
Hostnames []string - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- Server
Ips []string - IPs to include in the server's TLS certificate as SAN IP addresses.
- Tls
Ca intKey Bits - CA key bits, valid values depend on key type.
- Tls
Ca stringKey Type - CA key type, rsa or ec.
- Tls
Min stringVersion - Minimum TLS version to accept.
- path String
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - default
Tls IntegerClient Key Bits - Client certificate key bits, valid values depend on key type.
- default
Tls StringClient Key Type - Client certificate key type,
rsa
orec
. - default
Tls IntegerClient Ttl - Client certificate TTL in seconds
- description String
- A human-friendly description for this backend.
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- listen
Addrs List<String> - Addresses the KMIP server should listen on (
host:port
). - namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - server
Hostnames List<String> - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- server
Ips List<String> - IPs to include in the server's TLS certificate as SAN IP addresses.
- tls
Ca IntegerKey Bits - CA key bits, valid values depend on key type.
- tls
Ca StringKey Type - CA key type, rsa or ec.
- tls
Min StringVersion - Minimum TLS version to accept.
- path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - default
Tls numberClient Key Bits - Client certificate key bits, valid values depend on key type.
- default
Tls stringClient Key Type - Client certificate key type,
rsa
orec
. - default
Tls numberClient Ttl - Client certificate TTL in seconds
- description string
- A human-friendly description for this backend.
- disable
Remount boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- listen
Addrs string[] - Addresses the KMIP server should listen on (
host:port
). - namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - server
Hostnames string[] - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- server
Ips string[] - IPs to include in the server's TLS certificate as SAN IP addresses.
- tls
Ca numberKey Bits - CA key bits, valid values depend on key type.
- tls
Ca stringKey Type - CA key type, rsa or ec.
- tls
Min stringVersion - Minimum TLS version to accept.
- path str
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - default_
tls_ intclient_ key_ bits - Client certificate key bits, valid values depend on key type.
- default_
tls_ strclient_ key_ type - Client certificate key type,
rsa
orec
. - default_
tls_ intclient_ ttl - Client certificate TTL in seconds
- description str
- A human-friendly description for this backend.
- disable_
remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- listen_
addrs Sequence[str] - Addresses the KMIP server should listen on (
host:port
). - namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - server_
hostnames Sequence[str] - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- server_
ips Sequence[str] - IPs to include in the server's TLS certificate as SAN IP addresses.
- tls_
ca_ intkey_ bits - CA key bits, valid values depend on key type.
- tls_
ca_ strkey_ type - CA key type, rsa or ec.
- tls_
min_ strversion - Minimum TLS version to accept.
- path String
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - default
Tls NumberClient Key Bits - Client certificate key bits, valid values depend on key type.
- default
Tls StringClient Key Type - Client certificate key type,
rsa
orec
. - default
Tls NumberClient Ttl - Client certificate TTL in seconds
- description String
- A human-friendly description for this backend.
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- listen
Addrs List<String> - Addresses the KMIP server should listen on (
host:port
). - namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - server
Hostnames List<String> - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- server
Ips List<String> - IPs to include in the server's TLS certificate as SAN IP addresses.
- tls
Ca NumberKey Bits - CA key bits, valid values depend on key type.
- tls
Ca StringKey Type - CA key type, rsa or ec.
- tls
Min StringVersion - Minimum TLS version to accept.
Outputs
All input properties are implicitly available as output properties. Additionally, the SecretBackend resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing SecretBackend Resource
Get an existing SecretBackend resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecretBackendState, opts?: CustomResourceOptions): SecretBackend
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
default_tls_client_key_bits: Optional[int] = None,
default_tls_client_key_type: Optional[str] = None,
default_tls_client_ttl: Optional[int] = None,
description: Optional[str] = None,
disable_remount: Optional[bool] = None,
listen_addrs: Optional[Sequence[str]] = None,
namespace: Optional[str] = None,
path: Optional[str] = None,
server_hostnames: Optional[Sequence[str]] = None,
server_ips: Optional[Sequence[str]] = None,
tls_ca_key_bits: Optional[int] = None,
tls_ca_key_type: Optional[str] = None,
tls_min_version: Optional[str] = None) -> SecretBackend
func GetSecretBackend(ctx *Context, name string, id IDInput, state *SecretBackendState, opts ...ResourceOption) (*SecretBackend, error)
public static SecretBackend Get(string name, Input<string> id, SecretBackendState? state, CustomResourceOptions? opts = null)
public static SecretBackend get(String name, Output<String> id, SecretBackendState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Default
Tls intClient Key Bits - Client certificate key bits, valid values depend on key type.
- Default
Tls stringClient Key Type - Client certificate key type,
rsa
orec
. - Default
Tls intClient Ttl - Client certificate TTL in seconds
- Description string
- A human-friendly description for this backend.
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Listen
Addrs List<string> - Addresses the KMIP server should listen on (
host:port
). - Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - Server
Hostnames List<string> - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- Server
Ips List<string> - IPs to include in the server's TLS certificate as SAN IP addresses.
- Tls
Ca intKey Bits - CA key bits, valid values depend on key type.
- Tls
Ca stringKey Type - CA key type, rsa or ec.
- Tls
Min stringVersion - Minimum TLS version to accept.
- Default
Tls intClient Key Bits - Client certificate key bits, valid values depend on key type.
- Default
Tls stringClient Key Type - Client certificate key type,
rsa
orec
. - Default
Tls intClient Ttl - Client certificate TTL in seconds
- Description string
- A human-friendly description for this backend.
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Listen
Addrs []string - Addresses the KMIP server should listen on (
host:port
). - Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - Server
Hostnames []string - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- Server
Ips []string - IPs to include in the server's TLS certificate as SAN IP addresses.
- Tls
Ca intKey Bits - CA key bits, valid values depend on key type.
- Tls
Ca stringKey Type - CA key type, rsa or ec.
- Tls
Min stringVersion - Minimum TLS version to accept.
- default
Tls IntegerClient Key Bits - Client certificate key bits, valid values depend on key type.
- default
Tls StringClient Key Type - Client certificate key type,
rsa
orec
. - default
Tls IntegerClient Ttl - Client certificate TTL in seconds
- description String
- A human-friendly description for this backend.
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- listen
Addrs List<String> - Addresses the KMIP server should listen on (
host:port
). - namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - path String
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - server
Hostnames List<String> - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- server
Ips List<String> - IPs to include in the server's TLS certificate as SAN IP addresses.
- tls
Ca IntegerKey Bits - CA key bits, valid values depend on key type.
- tls
Ca StringKey Type - CA key type, rsa or ec.
- tls
Min StringVersion - Minimum TLS version to accept.
- default
Tls numberClient Key Bits - Client certificate key bits, valid values depend on key type.
- default
Tls stringClient Key Type - Client certificate key type,
rsa
orec
. - default
Tls numberClient Ttl - Client certificate TTL in seconds
- description string
- A human-friendly description for this backend.
- disable
Remount boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- listen
Addrs string[] - Addresses the KMIP server should listen on (
host:port
). - namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - server
Hostnames string[] - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- server
Ips string[] - IPs to include in the server's TLS certificate as SAN IP addresses.
- tls
Ca numberKey Bits - CA key bits, valid values depend on key type.
- tls
Ca stringKey Type - CA key type, rsa or ec.
- tls
Min stringVersion - Minimum TLS version to accept.
- default_
tls_ intclient_ key_ bits - Client certificate key bits, valid values depend on key type.
- default_
tls_ strclient_ key_ type - Client certificate key type,
rsa
orec
. - default_
tls_ intclient_ ttl - Client certificate TTL in seconds
- description str
- A human-friendly description for this backend.
- disable_
remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- listen_
addrs Sequence[str] - Addresses the KMIP server should listen on (
host:port
). - namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - path str
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - server_
hostnames Sequence[str] - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- server_
ips Sequence[str] - IPs to include in the server's TLS certificate as SAN IP addresses.
- tls_
ca_ intkey_ bits - CA key bits, valid values depend on key type.
- tls_
ca_ strkey_ type - CA key type, rsa or ec.
- tls_
min_ strversion - Minimum TLS version to accept.
- default
Tls NumberClient Key Bits - Client certificate key bits, valid values depend on key type.
- default
Tls StringClient Key Type - Client certificate key type,
rsa
orec
. - default
Tls NumberClient Ttl - Client certificate TTL in seconds
- description String
- A human-friendly description for this backend.
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- listen
Addrs List<String> - Addresses the KMIP server should listen on (
host:port
). - namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - path String
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - server
Hostnames List<String> - Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
- server
Ips List<String> - IPs to include in the server's TLS certificate as SAN IP addresses.
- tls
Ca NumberKey Bits - CA key bits, valid values depend on key type.
- tls
Ca StringKey Type - CA key type, rsa or ec.
- tls
Min StringVersion - Minimum TLS version to accept.
Import
KMIP Secret backend can be imported using the path
, e.g.
$ pulumi import vault:kmip/secretBackend:SecretBackend default kmip
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
vault
Terraform Provider.