Update enterprise vs hcp alerts (#23619) (#23627)

This commit is contained in:
Sarah Chavis
2023-10-11 16:27:13 -07:00
committed by GitHub
parent 7914b7dc39
commit cbc0d14a3e
34 changed files with 117 additions and 44 deletions

View File

@@ -6,7 +6,7 @@ description: The '/sys/config/control-group' endpoint configures control groups.
# `/sys/config/control-group` # `/sys/config/control-group`
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
The `/sys/config/control-group` endpoint is used to configure Control Group The `/sys/config/control-group` endpoint is used to configure Control Group
settings. settings.

View File

@@ -6,7 +6,7 @@ description: The '/sys/config/group-policy-application' endpoint is used to conf
# `/sys/config/group-policy-application` # `/sys/config/group-policy-application`
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'

View File

@@ -6,7 +6,7 @@ description: The '/sys/control-group' endpoint handles the Control Group workflo
## Authorize control group request ## Authorize control group request
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-and-hcp.mdx'
This endpoint authorizes a control group request. This endpoint authorizes a control group request.

View File

@@ -6,7 +6,7 @@ description: The `/sys/quotas/lease-count` endpoint is used to create, edit and
# `/sys/quotas/lease-count` # `/sys/quotas/lease-count`
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'

View File

@@ -8,7 +8,7 @@ description: |-
# `/sys/license/status` # `/sys/license/status`
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
The `/sys/license/status` endpoint is used to view update the license used in The `/sys/license/status` endpoint is used to view update the license used in
Vault. Vault.

View File

@@ -8,7 +8,7 @@ description: >-
# `/sys/replication` # `/sys/replication`
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'

View File

@@ -8,10 +8,10 @@ description: >-
# `/sys/replication/dr` # `/sys/replication/dr`
@include 'alerts/enterprise-only.mdx'
## Check DR status ## Check DR status
@include 'alerts/enterprise-and-hcp.mdx'
This endpoint prints information about the status of replication (mode, This endpoint prints information about the status of replication (mode,
sync progress, etc). sync progress, etc).
@@ -88,6 +88,8 @@ secondary, it will look something like:
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
@include 'alerts/enterprise-only.mdx'
This endpoint enables DR replication in primary mode. This is used when DR replication This endpoint enables DR replication in primary mode. This is used when DR replication
is currently disabled on the cluster (if the cluster is already a secondary, it is currently disabled on the cluster (if the cluster is already a secondary, it
must be promoted). must be promoted).
@@ -121,6 +123,8 @@ $ curl \
## Demote DR primary ## Demote DR primary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint demotes a DR primary cluster to a secondary. This DR secondary cluster This endpoint demotes a DR primary cluster to a secondary. This DR secondary cluster
@@ -143,6 +147,8 @@ $ curl \
## Disable DR primary ## Disable DR primary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint disables DR replication entirely on the cluster. Any secondaries will This endpoint disables DR replication entirely on the cluster. Any secondaries will
@@ -167,6 +173,8 @@ $ curl \
## Generate DR secondary token ## Generate DR secondary token
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint generates a DR secondary activation token for the This endpoint generates a DR secondary activation token for the
@@ -228,6 +236,8 @@ $ curl \
## Revoke DR secondary token ## Revoke DR secondary token
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint revokes a DR secondary's ability to connect to the DR primary cluster; This endpoint revokes a DR secondary's ability to connect to the DR primary cluster;
@@ -262,6 +272,8 @@ $ curl \
## Generate DR secondary public key ## Generate DR secondary public key
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint allows generating a public key that is used to encrypt the returned This endpoint allows generating a public key that is used to encrypt the returned
@@ -283,6 +295,8 @@ $ curl \
## Enable DR secondary ## Enable DR secondary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint enables replication on a DR secondary using a DR secondary activation This endpoint enables replication on a DR secondary using a DR secondary activation
@@ -333,6 +347,8 @@ $ curl \
## Promote DR secondary ## Promote DR secondary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint promotes the DR secondary cluster to DR primary. For data safety and This endpoint promotes the DR secondary cluster to DR primary. For data safety and
@@ -418,6 +434,8 @@ $ curl \
## Disable DR secondary ## Disable DR secondary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint disables DR replication entirely on the cluster. The cluster will no This endpoint disables DR replication entirely on the cluster. The cluster will no
@@ -454,6 +472,8 @@ $ curl \
## Update DR secondary's primary ## Update DR secondary's primary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
The update endpoint changes the primary cluster assigned to a DR The update endpoint changes the primary cluster assigned to a DR
@@ -552,6 +572,10 @@ $ curl \
## Generate disaster recovery operation token ## Generate disaster recovery operation token
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx'
The `/sys/replication/dr/secondary/generate-operation-token` endpoint is used to create a new Disaster The `/sys/replication/dr/secondary/generate-operation-token` endpoint is used to create a new Disaster
Recovery operation token for a DR secondary. These tokens are used to authorize Recovery operation token for a DR secondary. These tokens are used to authorize
certain DR Operations. They should be treated like traditional root tokens by certain DR Operations. They should be treated like traditional root tokens by
@@ -559,6 +583,8 @@ being generated when needed and deleted soon after.
## Read generation progress ## Read generation progress
@include 'alerts/enterprise-only.mdx'
This endpoint reads the configuration and process of the current generation This endpoint reads the configuration and process of the current generation
attempt. attempt.
@@ -598,6 +624,8 @@ encode the final token, it will never be returned.
## Start token generation ## Start token generation
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint initializes a new generation attempt. Only a single This endpoint initializes a new generation attempt. Only a single
@@ -638,6 +666,8 @@ $ curl \
## Cancel generation ## Cancel generation
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint cancels any in-progress generation attempt. This clears any This endpoint cancels any in-progress generation attempt. This clears any
@@ -657,6 +687,8 @@ $ curl \
## Provide key share to generate token ## Provide key share to generate token
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint is used to enter a single root key share to progress the This endpoint is used to enter a single root key share to progress the
@@ -712,6 +744,8 @@ status, and the encoded token, if the attempt is complete.
## Delete DR operation token ## Delete DR operation token
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint revokes the DR Operation Token. This token does not have a TTL This endpoint revokes the DR Operation Token. This token does not have a TTL
@@ -745,6 +779,8 @@ $ curl \
## Reindex Replication ## Reindex Replication
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint reindexes the local data storage. This can cause a very long delay This endpoint reindexes the local data storage. This can cause a very long delay
@@ -800,6 +836,8 @@ $ curl \
## `/sys/replication/dr/secondary/merkle-check` ## `/sys/replication/dr/secondary/merkle-check`
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
The Merkle check endpoint prints information about the corruption status of the Merkle tree on a DR The Merkle check endpoint prints information about the corruption status of the Merkle tree on a DR

View File

@@ -8,10 +8,10 @@ description: >-
# `/sys/replication/performance` # `/sys/replication/performance`
@include 'alerts/enterprise-and-hcp-plus.mdx'
## Check performance status ## Check performance status
@include 'alerts/enterprise-and-hcp.mdx'
This endpoint prints information about the status of replication (mode, This endpoint prints information about the status of replication (mode,
sync progress, etc). sync progress, etc).
@@ -86,6 +86,8 @@ secondary, it will look something like:
## Enable performance primary replication ## Enable performance primary replication
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint enables replication in primary mode. This is used when replication This endpoint enables replication in primary mode. This is used when replication
@@ -125,6 +127,8 @@ $ curl \
## Demote performance primary ## Demote performance primary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint demotes a performance primary cluster to a performance secondary. This endpoint demotes a performance primary cluster to a performance secondary.
@@ -147,6 +151,8 @@ $ curl \
## Disable performance primary ## Disable performance primary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint disables Performance Replication entirely on the cluster. Any This endpoint disables Performance Replication entirely on the cluster. Any
@@ -171,6 +177,8 @@ $ curl \
## Generate performance secondary token ## Generate performance secondary token
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint generates a performance secondary activation token for the This endpoint generates a performance secondary activation token for the
@@ -231,6 +239,8 @@ $ curl \
## Revoke performance secondary token ## Revoke performance secondary token
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint revokes a performance secondary's ability to connect to the This endpoint revokes a performance secondary's ability to connect to the
@@ -265,6 +275,8 @@ $ curl \
## Create paths filter ## Create paths filter
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint is used to modify the mounts and namespaces that are filtered to a secondary. This endpoint is used to modify the mounts and namespaces that are filtered to a secondary.
@@ -311,6 +323,8 @@ $ curl \
## Read paths filter ## Read paths filter
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint is used to read the mode and the mount/namespace paths that are filtered This endpoint is used to read the mode and the mount/namespace paths that are filtered
@@ -343,6 +357,8 @@ $ curl \
## Delete paths filter ## Delete paths filter
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint is used to delete the mount and namespace filters for a secondary. This endpoint is used to delete the mount and namespace filters for a secondary.
@@ -366,6 +382,8 @@ $ curl \
## Read dynamically generated filter (PRIMARY) ## Read dynamically generated filter (PRIMARY)
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint is used to read the namespace and the mount paths that are dynamically This endpoint is used to read the namespace and the mount paths that are dynamically
@@ -398,6 +416,8 @@ $ curl \
## Read dynamically generated filter (SECONDARY) ## Read dynamically generated filter (SECONDARY)
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint is used to read the namespace and the mount paths that are dynamically This endpoint is used to read the namespace and the mount paths that are dynamically
@@ -430,6 +450,8 @@ $ curl \
## Fetch performance secondary public key ## Fetch performance secondary public key
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint allows fetching a public key that is used to encrypt the returned This endpoint allows fetching a public key that is used to encrypt the returned
@@ -451,6 +473,8 @@ $ curl \
## Enable performance secondary ## Enable performance secondary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint enables Performance Replication on a secondary using a secondary activation This endpoint enables Performance Replication on a secondary using a secondary activation
@@ -501,6 +525,8 @@ $ curl \
## Promote performance secondary ## Promote performance secondary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint promotes the performance secondary cluster to performance primary. This endpoint promotes the performance secondary cluster to performance primary.
@@ -540,6 +566,8 @@ $ curl \
## Disable performance secondary ## Disable performance secondary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
This endpoint disables Performance Replication entirely on the cluster. The cluster will no This endpoint disables Performance Replication entirely on the cluster. The cluster will no
@@ -566,6 +594,8 @@ $ curl \
## Update performance secondary's primary ## Update performance secondary's primary
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
The update endpoint changes the primary cluster assigned to a The update endpoint changes the primary cluster assigned to a

View File

@@ -8,7 +8,7 @@ description: >-
# `/sys/sealwrap/rewrap` # `/sys/sealwrap/rewrap`
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'

View File

@@ -5,12 +5,12 @@ description: |-
The `/sys/storage/raft/snapshot-auto` endpoints are used to manage automated The `/sys/storage/raft/snapshot-auto` endpoints are used to manage automated
snapshots with Vault's Raft storage backend. snapshots with Vault's Raft storage backend.
This is an Enterprise-only feature.
--- ---
# `/sys/storage/raft/snapshot-auto` # `/sys/storage/raft/snapshot-auto`
@include 'alerts/enterprise-only.mdx'
@include 'alerts/restricted-root.mdx' @include 'alerts/restricted-root.mdx'
The `/sys/storage/raft/snapshot-auto` endpoints are used to manage automated The `/sys/storage/raft/snapshot-auto` endpoints are used to manage automated
@@ -18,8 +18,6 @@ snapshots with Vault's Raft storage backend.
## Create/update an automated snapshots config ## Create/update an automated snapshots config
@include 'alerts/enterprise-and-hcp-plus.mdx'
**This endpoint requires sudo capability.** **This endpoint requires sudo capability.**
This endpoint creates or updates a named configuration. Each configuration This endpoint creates or updates a named configuration. Each configuration

View File

@@ -9,7 +9,7 @@ description: |-
# Automated integrated storage snapshots # Automated integrated storage snapshots
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
Any production system should include a provision for taking regular backups. Any production system should include a provision for taking regular backups.
Vault Enterprise can be configured to take and store snapshots at a specific Vault Enterprise can be configured to take and store snapshots at a specific

View File

@@ -6,7 +6,7 @@ description: Vault Enterprise Consistency Model
# Vault eventual consistency # Vault eventual consistency
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-and-hcp.mdx'
When running in a cluster, Vault has an eventual consistency model. When running in a cluster, Vault has an eventual consistency model.
Only one node (the leader) can write to Vault's storage. Only one node (the leader) can write to Vault's storage.

View File

@@ -6,7 +6,7 @@ description: Vault Enterprise has support for Control Group Authorization.
# Vault Enterprise control groups # Vault Enterprise control groups
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-and-hcp.mdx'
Vault Enterprise has support for Control Group Authorization. Control Groups Vault Enterprise has support for Control Group Authorization. Control Groups
add additional authorization factors to be required before satisfying a request. add additional authorization factors to be required before satisfying a request.

View File

@@ -6,7 +6,7 @@ description: An overview of license autoloading.
# License autoloading # License autoloading
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
Prior to Vault 1.8, Vault Enterprise would be licensed using special binaries Prior to Vault 1.8, Vault Enterprise would be licensed using special binaries
that contained embedded licenses, or via a license written into Vault storage that contained embedded licenses, or via a license written into Vault storage

View File

@@ -6,7 +6,7 @@ description: An overview of license.
# Vault license # Vault license
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
Licenses and EULA enhancements have been introduced in Vault 1.8 release. Please refer to the [FAQ](/vault/docs/enterprise/license/faq) for common questions concerning these changes. Licenses and EULA enhancements have been introduced in Vault 1.8 release. Please refer to the [FAQ](/vault/docs/enterprise/license/faq) for common questions concerning these changes.

View File

@@ -7,7 +7,7 @@ description: >-
# Automated license utilization reporting # Automated license utilization reporting
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
Automated license utilization reporting sends license utilization data to Automated license utilization reporting sends license utilization data to
HashiCorp without requiring you to manually collect and report them. It also HashiCorp without requiring you to manually collect and report them. It also

View File

@@ -7,7 +7,7 @@ description: >-
# Managed keys # Managed keys
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-and-hcp.mdx'
Within certain environments, customers want to leverage key management systems Within certain environments, customers want to leverage key management systems
external to Vault, when handling, storing, and interacting with external to Vault, when handling, storing, and interacting with

View File

@@ -8,7 +8,7 @@ description: >-
# Vault enterprise MFA support # Vault enterprise MFA support
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
Vault Enterprise has support for Multi-factor Authentication (MFA), using Vault Enterprise has support for Multi-factor Authentication (MFA), using
different authentication types. MFA is built on top of the Identity system of different authentication types. MFA is built on top of the Identity system of

View File

@@ -6,7 +6,7 @@ description: Vault Enterprise supports Duo MFA type.
# Duo MFA # Duo MFA
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
This page demonstrates the Duo MFA on ACL'd paths of Vault. This page demonstrates the Duo MFA on ACL'd paths of Vault.

View File

@@ -6,7 +6,7 @@ description: Vault Enterprise supports Okta MFA type.
# Okta MFA # Okta MFA
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
This page demonstrates the Okta MFA on ACL'd paths of Vault. This page demonstrates the Okta MFA on ACL'd paths of Vault.

View File

@@ -6,7 +6,7 @@ description: Vault Enterprise supports PingID MFA type.
# PingID MFA # PingID MFA
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
This page demonstrates PingID MFA on ACL'd paths of Vault. This page demonstrates PingID MFA on ACL'd paths of Vault.

View File

@@ -6,7 +6,7 @@ description: Vault Enterprise supports TOTP MFA type.
# TOTP MFA # TOTP MFA
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
This page demonstrates the TOTP MFA on ACL'd paths of Vault. This page demonstrates the TOTP MFA on ACL'd paths of Vault.

View File

@@ -6,7 +6,7 @@ description: Performance Standby Nodes - Vault Enterprise
# Performance standby nodes # Performance standby nodes
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-and-hcp.mdx'
Vault supports a multi-server mode for high availability. This mode protects Vault supports a multi-server mode for high availability. This mode protects
against outages by running multiple Vault servers. High availability mode against outages by running multiple Vault servers. High availability mode

View File

@@ -7,7 +7,7 @@ description: |-
# Vault with AWS KMS external key store (XKS) via PKCS#11 and XKS proxy # Vault with AWS KMS external key store (XKS) via PKCS#11 and XKS proxy
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
~> **Note**: AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) is used in this document as a sample implementation. ~> **Note**: AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) is used in this document as a sample implementation.

View File

@@ -9,7 +9,7 @@ description: |-
# PKCS#11 provider # PKCS#11 provider
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
-> **Note**: This feature is part of the [KMIP Secret Engine](/vault/docs/secrets/kmip), which requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) -> **Note**: This feature is part of the [KMIP Secret Engine](/vault/docs/secrets/kmip), which requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
with the Advanced Data Protection Module. with the Advanced Data Protection Module.

View File

@@ -7,7 +7,7 @@ description: |-
# Oracle TDE # Oracle TDE
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
[Oracle Transparent Data Encryption](https://docs.oracle.com/en/database/oracle/oracle-database/19/asoag/introduction-to-transparent-data-encryption.html) (TDE) [Oracle Transparent Data Encryption](https://docs.oracle.com/en/database/oracle/oracle-database/19/asoag/introduction-to-transparent-data-encryption.html) (TDE)
is supported with the [Vault PKCS#11 provider](/vault/docs/enterprise/pkcs11-provider). is supported with the [Vault PKCS#11 provider](/vault/docs/enterprise/pkcs11-provider).

View File

@@ -7,7 +7,7 @@ description: |-
# Redundancy zones # Redundancy zones
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-only.mdx'
Vault Enterprise Redundancy Zones provide both read scaling and resiliency benefits by enabling Vault Enterprise Redundancy Zones provide both read scaling and resiliency benefits by enabling
the deployment of non-voting nodes alongside voting nodes on a per availability zone basis. the deployment of non-voting nodes alongside voting nodes on a per availability zone basis.

View File

@@ -9,6 +9,8 @@ description: >-
# Vault Enterprise replication # Vault Enterprise replication
@include 'alerts/enterprise-and-hcp.mdx'
## Overview ## Overview
Many organizations have infrastructure that spans multiple datacenters. Vault Many organizations have infrastructure that spans multiple datacenters. Vault
@@ -83,7 +85,7 @@ secondaries to have a different configuration than their primary. Tokens and le
## Performance replication ## Performance replication
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-and-hcp.mdx'
In Performance Replication, secondaries keep track of their own tokens and leases In Performance Replication, secondaries keep track of their own tokens and leases
but share the underlying configuration, policies, and supporting secrets (K/V values, but share the underlying configuration, policies, and supporting secrets (K/V values,

View File

@@ -8,7 +8,7 @@ description: |-
# Seal wrap # Seal wrap
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-and-hcp.mdx'
Vault Enterprise features a mechanism to wrap values with an extra layer of Vault Enterprise features a mechanism to wrap values with an extra layer of
encryption for supporting [seals](/vault/docs/configuration/seal). This adds an encryption for supporting [seals](/vault/docs/configuration/seal). This adds an

View File

@@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
# Examples # Examples
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-and-hcp.mdx'
Following are some examples that help to introduce concepts. If you are Following are some examples that help to introduce concepts. If you are
unfamiliar with writing Sentinel policies in Vault, please read through to unfamiliar with writing Sentinel policies in Vault, please read through to

View File

@@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
# Vault Enterprise and Sentinel integration # Vault Enterprise and Sentinel integration
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-and-hcp.mdx'
Vault Enterprise integrates HashiCorp Sentinel to provide a rich set of access Vault Enterprise integrates HashiCorp Sentinel to provide a rich set of access
control functionality. Because Vault is a security-focused product trusted with control functionality. Because Vault is a security-focused product trusted with

View File

@@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
# Properties # Properties
@include 'alerts/enterprise-and-hcp-plus.mdx' @include 'alerts/enterprise-and-hcp.mdx'
Vault injects a rich set of data into the running Sentinel environment, Vault injects a rich set of data into the running Sentinel environment,
allowing for very fine-grained controls. The set of available properties are allowing for very fine-grained controls. The set of available properties are

View File

@@ -1,7 +0,0 @@
<EnterpriseAlert product="vault">
<a href="https://www.hashicorp.com/products/vault/pricing">
Vault Enterprise
</a> license or <a href="/hcp/docs/vault/tiers-and-features#plus-tier">
HCP Vault Plus
</a> cluster required.
</EnterpriseAlert>

View File

@@ -0,0 +1,12 @@
<EnterpriseAlert product="vault">
Requires a <a href="https://www.hashicorp.com/products/vault/pricing">
Vault Enterprise
</a> license to <b>configure</b>.
<br /><br />
Requires a <a href="https://www.hashicorp.com/products/vault/pricing">
Vault Enterprise
</a> license or <a href="/hcp/docs/vault/tiers-and-features">
HCP Vault
</a> cluster to <b>use</b>.
</EnterpriseAlert>