Store secrets in Vault

    To store secrets in Vault, complete the following steps:

    1. Provide Vault server address and token.
    2. .
    3. Manage secrets through the InfluxDB API.

    Start a Vault server and ensure InfluxDB has network access to the server.

    The following links provide information about running Vault in both development and production:

    For this example, install Vault on your local machine and start a Vault dev server.

    Use influxd Vault-related tags or Vault environment variables to provide connection credentials and other important Vault-related information to InfluxDB.

    Vault address

    Provide the API address of your Vault server (available in the Vault server output) using the --vault-addr flag when starting influxd or with the VAULT_ADDR environment variable.

    Vault token

    Your Vault server configuration may require other Vault settings.

    Start the influxd service with the option set to vault any other necessary flags.

    influxd includes the following Vault configuration options. If set, these flags override any :

    • --vault-addr
    • --vault-capath
    • --vault-client-key
    • --vault-max-retries
    • --vault-client-timeout
    • --vault-skip-verify
    • --vault-tls-server-name

    Use the InfluxDB /org/{orgID}/secrets API endpoint to add tokens to Vault. For details, see Manage secrets.