--
This mailing list is governed under the HashiCorp Community Guidelines - https://www.hashicorp.com/community-guidelines.html. Behavior in violation of those guidelines may result in your removal from this mailing list.
GitHub Issues: https://github.com/hashicorp/vault/issues
IRC: #vault-tool on Freenode
---
You received this message because you are subscribed to the Google Groups "Vault" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vault-tool+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/4c333b12-baea-45b1-84ff-9c30b1edbde5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/b13cdc31-0bb8-4260-9e2e-62b8e81a801f%40googlegroups.com.
On November 7, 2016 at 5:18:11 PM, John Stafford (john.howar...@gmail.com) wrote:
I have been using this https://spring.io/blog/2016/06/24/managing-secrets-with-vault , but with great difficulty.Microsoft Windows [Version 10.0.14393](c) 2016 Microsoft Corporation. All rights reserved.>vault serverAt least one config path must be specified with -configUsage: vault server [options]Start a Vault server.This command starts a Vault server that responds to API requests.Vault will start in a "sealed" state. The Vault must be unsealedwith "vault unseal" or the API before this server can respond to requests.This must be done for every server.If the server is being started against a storage backend that hasbrand new (no existing Vault data in it), it must be initialized with"vault init" or the API first.General Options:-config=<path> Path to the configuration file or directory. This canbe specified multiple times. If it is a directory,all files with a ".hcl" or ".json" suffix will beloaded.-dev Enables Dev mode. In this mode, Vault is completelyin-memory and unsealed. Do not run the Dev server inproduction!-dev-root-token-id="" If set, the root token returned in Dev mode will havethe given ID. This *only* has an effect when runningin Dev mode. Can also be specified with theVAULT_DEV_ROOT_TOKEN_ID environment variable.-dev-listen-address="" If set, this overrides the normal Dev mode listenaddress of "127.0.0.1:8200". Can also be specifiedwith the VAULT_DEV_LISTEN_ADDRESS environmentvariable.-log-level=info Log verbosity. Defaults to "info", will be output tostderr. Supported values: "trace", "debug", "info","warn", "err">vault server -config vault.confError loading configuration from vault.conf: GetFileAttributesEx vault.conf: The system cannot find the file specified.I noticed that some of the commands are linux/unix type, eg. export instead of set. Does the config for vault have a different extension?
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/82a2f13c-6f97-426c-93ec-f7930b5a97a0%40googlegroups.com.