mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-29 17:52:32 +00:00
Update getting started output to match new format
This commit is contained in:
@@ -38,37 +38,39 @@ terminal session and checking that `vault` is available. By executing
|
|||||||
|
|
||||||
```
|
```
|
||||||
$ vault
|
$ vault
|
||||||
usage: vault [--version] [--help] <command> [<args>]
|
usage: vault [-version] [-help] <command> [args]
|
||||||
|
|
||||||
Available commands are:
|
Common commands:
|
||||||
|
delete Delete operation on secrets in Vault
|
||||||
|
help Look up the help for a path
|
||||||
|
read Read data or secrets from Vault
|
||||||
|
renew Renew the lease of a secret
|
||||||
|
revoke Revoke a secret.
|
||||||
|
server Start a Vault server
|
||||||
|
status Outputs status of whether Vault is sealed and if HA mode is enabled
|
||||||
|
write Write secrets or configuration into Vault
|
||||||
|
|
||||||
|
All other commands:
|
||||||
audit-disable Disable an audit backend
|
audit-disable Disable an audit backend
|
||||||
audit-enable Enable an audit backend
|
audit-enable Enable an audit backend
|
||||||
audit-list Lists enabled audit backends in Vault
|
audit-list Lists enabled audit backends in Vault
|
||||||
auth Prints information about how to authenticate with Vault
|
auth Prints information about how to authenticate with Vault
|
||||||
auth-disable Disable an auth provider
|
auth-disable Disable an auth provider
|
||||||
auth-enable Enable a new auth provider
|
auth-enable Enable a new auth provider
|
||||||
delete Delete operation on secrets in Vault
|
|
||||||
help Look up the help for a path
|
|
||||||
init Initialize a new Vault server
|
init Initialize a new Vault server
|
||||||
mount Mount a logical backend
|
mount Mount a logical backend
|
||||||
mounts Lists mounted backends in Vault
|
mounts Lists mounted backends in Vault
|
||||||
policies List the policies on the server
|
policies List the policies on the server
|
||||||
policy-delete Delete a policy from the server
|
policy-delete Delete a policy from the server
|
||||||
policy-write Write a policy to the server
|
policy-write Write a policy to the server
|
||||||
read Read data or secrets from Vault
|
|
||||||
remount Remount a secret backend to a new path
|
remount Remount a secret backend to a new path
|
||||||
renew Renew the lease of a secret
|
|
||||||
revoke Revoke a secret.
|
|
||||||
seal Seals the vault server
|
seal Seals the vault server
|
||||||
server Start a Vault server
|
|
||||||
status Outputs status of whether Vault is sealed and if HA mode is enabled
|
|
||||||
token-create Create a new auth token
|
token-create Create a new auth token
|
||||||
token-renew Renew an auth token
|
token-renew Renew an auth token
|
||||||
token-revoke Revoke one or more auth tokens
|
token-revoke Revoke one or more auth tokens
|
||||||
unmount Unmount a secret backend
|
unmount Unmount a secret backend
|
||||||
unseal Unseals the vault server
|
unseal Unseals the vault server
|
||||||
version Prints the Vault version
|
version Prints the Vault version
|
||||||
write Write secrets or configuration into Vault
|
|
||||||
```
|
```
|
||||||
|
|
||||||
If you get an error that Vault could not be found, then your PATH environment
|
If you get an error that Vault could not be found, then your PATH environment
|
||||||
|
|||||||
Reference in New Issue
Block a user