Configuration
Suggest editsImplementing Hashicorp Vault with EDB Postgres Advanced Server version 15.2 and above or EDB Postgres Extended Server version 15.2 and above, requires the following components:
Note
The EDB Postgres Advanced Server version 15.2 and above and EDB Postgres Extended Server version 15.2 and above, products will be referred to as EDB Postgres distribution. The specific distribution type will be dependent upon customer need or preference.
- EDB Postgres distribution (15.2 or later)
- Hashicorp Vault v1.13.3
Prerequisites
- A running EDB Postgres distribution
- Hashicorp Vault installed and deployed per your VM environment
Enable Hashicorp Vault Transit Secrets Engine
Note
You have to set your environment variable with Hashicorp Vault. If you receive this error message “Get "https://127.0.0.1:8200/v1/sys/seal-status": http: server gave HTTP response to HTTPS client” you need to issue this in your command line export VAULT_ADDR="http://127.0.0.1:8200
".
After your Hashicorp Vault configuration is installed and deployed per the guidelines in the Hashicorp documentation, you will then need to enable the transit secrets engine.
Assume root user.
First set your two variables, your API address and token you receieved during installation and setup.
- Before you enable the Transit Secrets Engine you can check your Vault Server status with
vault status
.
- Type
vault secrets enable transit
.
- Next you will create your encryption key with an identifiable name. For example:
vault write -f transit/keys/pg-tde-master-1
- You now have your encryption key set and are ready to export your WRAP and UNWRAP commands and initialize your database.
Could this page be better? Report a problem or suggest an addition!