Store secrets in Vault
To store secrets in Vault, complete the following steps:
Start a Vault server and ensure InfluxDB has network access to the server.
The following links provide information about running Vault in both development and production:
For this example, install Vault on your local machine and start a Vault dev server.
Use influxd
Vault-related tags or Vault environment variables to provide connection credentials and other important Vault-related information to InfluxDB.
Vault address
Provide the API address of your Vault server (available in the Vault server output) using the --vault-addr flag when starting influxd
or with the VAULT_ADDR
environment variable.
Vault token
Your Vault server configuration may require other Vault settings.
Start the influxd service with the option set to vault
any other necessary flags.
influxd
includes the following Vault configuration options. If set, these flags override any :
--vault-addr
--vault-capath
--vault-client-key
--vault-max-retries
--vault-client-timeout
--vault-skip-verify
--vault-tls-server-name
Use the InfluxDB /org/{orgID}/secrets
API endpoint to add tokens to Vault. For details, see Manage secrets.