mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-12-01 09:43:50 +00:00
* conversion stage 1 * correct image paths * add sidebar title to frontmatter * docs/concepts and docs/internals * configuration docs and multi-level nav corrections * commands docs, index file corrections, small item nav correction * secrets converted * auth * add enterprise and agent docs * add extra dividers * secret section, wip * correct sidebar nav title in front matter for apu section, start working on api items * auth and backend, a couple directory structure fixes * remove old docs * intro side nav converted * reset sidebar styles, add hashi-global-styles * basic styling for nav sidebar * folder collapse functionality * patch up border length on last list item * wip restructure for content component * taking middleman hacking to the extreme, but its working * small css fix * add new mega nav * fix a small mistake from the rebase * fix a content resolution issue with middleman * title a couple missing docs pages * update deps, remove temporary markup * community page * footer to layout, community page css adjustments * wip downloads page * deps updated, downloads page ready * fix community page * homepage progress * add components, adjust spacing * docs and api landing pages * a bunch of fixes, add docs and api landing pages * update deps, add deploy scripts * add readme note * update deploy command * overview page, index title * Update doc fields Note this still requires the link fields to be populated -- this is solely related to copy on the description fields * Update api_basic_categories.yml Updated API category descriptions. Like the document descriptions you'll still need to update the link headers to the proper target pages. * Add bottom hero, adjust CSS, responsive friendly * Add mega nav title * homepage adjustments, asset boosts * small fixes * docs page styling fixes * meganav title * some category link corrections * Update API categories page updated to reflect the second level headings for api categories * Update docs_detailed_categories.yml Updated to represent the existing docs structure * Update docs_detailed_categories.yml * docs page data fix, extra operator page remove * api data fix * fix makefile * update deps, add product subnav to docs and api landing pages * Rearrange non-hands-on guides to _docs_ Since there is no place for these on learn.hashicorp, we'll put them under _docs_. * WIP Redirects for guides to docs * content and component updates * font weight hotfix, redirects * fix guides and intro sidenavs * fix some redirects * small style tweaks * Redirects to learn and internally to docs * Remove redirect to `/vault` * Remove `.html` from destination on redirects * fix incorrect index redirect * final touchups * address feedback from michell for makefile and product downloads
179 lines
5.7 KiB
Markdown
179 lines
5.7 KiB
Markdown
---
|
||
layout: "docs"
|
||
page_title: "DynamoDB - Storage Backends - Configuration"
|
||
sidebar_title: "DynamoDB"
|
||
sidebar_current: "docs-configuration-storage-dynamodb"
|
||
description: |-
|
||
The DynamoDB storage backend is used to persist Vault's data in DynamoDB
|
||
table.
|
||
---
|
||
|
||
# DynamoDB Storage Backend
|
||
|
||
The DynamoDB storage backend is used to persist Vault's data in
|
||
[DynamoDB][dynamodb] table.
|
||
|
||
- **High Availability** – the DynamoDB storage backend supports high
|
||
availability. Because DynamoDB uses the time on the Vault node to implement
|
||
the session lifetimes on its locks, significant clock skew across Vault nodes
|
||
could cause contention issues on the lock.
|
||
|
||
- **Community Supported** – the DynamoDB storage backend is supported by the
|
||
community. While it has undergone review by HashiCorp employees, they may not
|
||
be as knowledgeable about the technology. If you encounter problems with this
|
||
storage backend, you could be referred to the original author for support.
|
||
|
||
```hcl
|
||
storage "dynamodb" {
|
||
ha_enabled = "true"
|
||
region = "us-west-2"
|
||
table = "vault-data"
|
||
}
|
||
```
|
||
|
||
For more information about the read/write capacity of DynamoDB tables, please
|
||
see the [official AWS DynamoDB documentation][dynamodb-rw-capacity].
|
||
|
||
## DynamoDB Parameters
|
||
|
||
- `endpoint` `(string: "")` – Specifies an alternative, AWS compatible, DynamoDB
|
||
endpoint. This can also be provided via the environment variable
|
||
`AWS_DYNAMODB_ENDPOINT`.
|
||
|
||
- `ha_enabled` `(string: "false")` – Specifies whether this backend should be used
|
||
to run Vault in high availability mode. Valid values are "true" or "false". This
|
||
can also be provided via the environment variable `DYNAMODB_HA_ENABLED`.
|
||
|
||
- `max_parallel` `(string: "128")` – Specifies the maximum number of concurrent
|
||
requests.
|
||
|
||
- `region` `(string "us-east-1")` – Specifies the AWS region. This can also be
|
||
provided via the environment variable `AWS_DEFAULT_REGION`.
|
||
|
||
- `read_capacity` `(int: 5)` – Specifies the maximum number of reads consumed
|
||
per second on the table. This can also be provided via the environment
|
||
variable `AWS_DYNAMODB_READ_CAPACITY`.
|
||
|
||
- `table` `(string: "vault-dynamodb-backend")` – Specifies the name of the
|
||
DynamoDB table in which to store Vault data. If the specified table does not
|
||
yet exist, it will be created during initialization. This can also be
|
||
provided via the environment variable `AWS_DYNAMODB_TABLE`. See the
|
||
information on the table schema below.
|
||
|
||
- `write_capacity` `(int: 5)` – Specifies the maximum number of writes performed
|
||
per second on the table. This can also be provided via the environment
|
||
variable `AWS_DYNAMODB_WRITE_CAPACITY`.
|
||
|
||
The following settings are used for authenticating to AWS. If you are
|
||
running your Vault server on an EC2 instance, you can also make use of the EC2
|
||
instance profile service to provide the credentials Vault will use to make
|
||
DynamoDB API calls. Leaving the `access_key` and `secret_key` fields empty will
|
||
cause Vault to attempt to retrieve credentials from the AWS metadata service.
|
||
|
||
- `access_key` `(string: <required>)` – Specifies the AWS access key. This can
|
||
also be provided via the environment variable `AWS_ACCESS_KEY_ID`.
|
||
|
||
- `secret_key` `(string: <required>)` – Specifies the AWS secret key. This can
|
||
also be provided via the environment variable `AWS_SECRET_ACCESS_KEY`.
|
||
|
||
- `session_token` `(string: "")` – Specifies the AWS session token. This can
|
||
also be provided via the environment variable `AWS_SESSION_TOKEN`.
|
||
|
||
## Required AWS Permissions
|
||
|
||
The governing policy for the IAM user or EC2 instance profile that Vault uses
|
||
to access DynamoDB must contain the following permissions for Vault to perform
|
||
the required operations on the DynamoDB table:
|
||
|
||
```javascript
|
||
"Statement": [
|
||
{
|
||
"Action": [
|
||
"dynamodb:DescribeLimits",
|
||
"dynamodb:DescribeTimeToLive",
|
||
"dynamodb:ListTagsOfResource",
|
||
"dynamodb:DescribeReserveCapacityOfferings",
|
||
"dynamodb:DescribeReserveCapacity",
|
||
"dynamodb:ListTables",
|
||
"dynamodb:BatchGetItem",
|
||
"dynamodb:BatchWriteItem",
|
||
"dynamodb:CreateTable",
|
||
"dynamodb:DeleteItem",
|
||
"dynamodb:GetItem",
|
||
"dynamodb:GetRecords",
|
||
"dynamodb:PutItem",
|
||
"dynamodb:Query",
|
||
"dynamodb:UpdateItem",
|
||
"dynamodb:Scan",
|
||
"dynamodb:DescribeTable"
|
||
],
|
||
"Effect": "Allow",
|
||
"Resource": [ "arn:aws:dynamodb:us-east-1:... dynamodb table ARN" ]
|
||
},
|
||
```
|
||
|
||
## Table Schema
|
||
|
||
If you are going to create the DynamoDB table prior to the execution and
|
||
initialization of Vault, you will need to create a table with these attributes:
|
||
|
||
* Primary partition key: "Path", a string
|
||
* Primary sort key: "Key", a string
|
||
|
||
You might create the table via Terraform, with a configuration similar to this:
|
||
|
||
```
|
||
resource "aws_dynamodb_table" "dynamodb-table" {
|
||
name = "${var.dynamoTable}"
|
||
read_capacity = 1
|
||
write_capacity = 1
|
||
hash_key = "Path"
|
||
range_key = "Key"
|
||
attribute [
|
||
{
|
||
name = "Path"
|
||
type = "S"
|
||
},
|
||
{
|
||
name = "Key"
|
||
type = "S"
|
||
}
|
||
]
|
||
tags {
|
||
Name = "vault-dynamodb-table"
|
||
Environment = "prod"
|
||
}
|
||
}
|
||
```
|
||
|
||
## DynamoDB Examples of Vault Configuration
|
||
|
||
### Custom Table and Read-Write Capacity
|
||
|
||
This example shows using a custom table name and read/write capacity.
|
||
|
||
```hcl
|
||
storage "dynamodb" {
|
||
table = "my-vault-data"
|
||
|
||
read_capacity = 10
|
||
write_capacity = 15
|
||
}
|
||
```
|
||
|
||
### Enabling High Availability
|
||
|
||
This example show enabling high availability for the DynamoDB storage backend.
|
||
|
||
```hcl
|
||
api_addr = "https://vault-leader.my-company.internal"
|
||
|
||
storage "dynamodb" {
|
||
ha_enabled = "true"
|
||
...
|
||
}
|
||
```
|
||
|
||
[dynamodb]: https://aws.amazon.com/dynamodb/
|
||
[dynamodb-rw-capacity]: https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/WorkingWithTables.html#ProvisionedThroughput
|