Merge pull request #399 from btkrausen/update-day-36

fixing typo and adding links
This commit is contained in:
Michael Cade 2023-04-06 18:33:37 +01:00 committed by GitHub
commit f833ee35fc
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 4 additions and 2 deletions

View File

@ -87,7 +87,7 @@ Or contact us via Twitter, my handle is [@MichaelCade1](https://twitter.com/Mich
### Secrets Management ### Secrets Management
- [✔️] 🕵 35 > [Understanding the Importance of Secrets Management](2023/day35.md) - [✔️] 🕵 35 > [Understanding the Importance of Secrets Management](2023/day35.md)
- [] 🕵 36 > [](2023/day36.md) - [✔️] 🕵 36 > [Securing Secrets with HashiCorp Vault](2023/day36.md)
- [] 🕵 37 > [](2023/day37.md) - [] 🕵 37 > [](2023/day37.md)
- [] 🕵 38 > [](2023/day38.md) - [] 🕵 38 > [](2023/day38.md)
- [] 🕵 39 > [](2023/day39.md) - [] 🕵 39 > [](2023/day39.md)

View File

@ -45,3 +45,5 @@ stanza).
* Using a root token gives you complete, unrestricted access to anything in Vault. The root token is highly privileged and should NOT be shared. In fact, it is not evaluated against any Vault policies. Therefore, it is recommended to use the root token to perform the initial configuration, namely auth methods, and then the token should be revoked. [Another root token can be generated](https://youtu.be/rcQsNinVl0Y) in the future if needed. * Using a root token gives you complete, unrestricted access to anything in Vault. The root token is highly privileged and should NOT be shared. In fact, it is not evaluated against any Vault policies. Therefore, it is recommended to use the root token to perform the initial configuration, namely auth methods, and then the token should be revoked. [Another root token can be generated](https://youtu.be/rcQsNinVl0Y) in the future if needed.
   
* A single Vault node may be sufficient for lab environments if redundancy and high availability aren't a concern. If service uptime is essential, use a minimum of 3 nodes (assuming integrated storage). I recommend five nodes for production clusters to give you n + 2 redundancy, meaning you can lose up to two nodes, and the Vault service remains functional. * A single Vault node may be sufficient for lab environments if redundancy and high availability aren't a concern. If service uptime is essential, use a minimum of 3 nodes (assuming integrated storage). I recommend five nodes for production clusters to give you n + 2 redundancy, meaning you can lose up to two nodes, and the Vault service remains functional.
See you on [Day 37](day37.md).