Use SQL to query engines, kv secrets, roles & more from your Hashicorp Vault.
- Get started →
- Documentation: Table definitions & examples
- Community: Join #steampipe on Slack →
- Get involved: Issues
Install the plugin with Steampipe:
steampipe plugin install theapsgroup/vault
Configure the plugin using the configuration file:
vi ~/.steampipe/vault.spc
Or environment variables:
export VAULT_ADDR=https://vault.mycorp.com/
export VAULT_TOKEN=s.f7Ea3C3ojOYE0GRLzmhSGNkE
Start Steampipe:
steampipe query
Run a query:
select
path,
type,
description
from
vault_engine;
Prerequisites:
Clone:
git clone https://github.com/theapsgroup/steampipe-plugin-vault.git
cd steampipe-plugin-vault
Build, which automatically installs the new version to your ~/.steampipe/plugins
directory:
make
Configure the plugin:
cp config/* ~/.steampipe/config
vi ~/.steampipe/config/vault.spc
Try it!
steampipe query
> .inspect vault
Further reading:
All contributions are subject to the Apache 2.0 open source license.