This post first appeared on TeKanAid’s blog.

Overview

In this post, we discuss and demo HashiCorp Waypoint which is one of the two latest HashiCorp products released at HashiConf Digital in October 2020. The other product was HashiCorp Boundary for secure sessions management for human to machine access. We recently wrote a blog post covering HashiCorp Boundary so check it out if you haven’t already.

tl;dr you can find the code for this post in the webblog app repo. Moreover, below is a video explanation.

Video Chapters

You can skip to the relevant chapters below:


This post first appeared on TeKanAid’s blog.

Overview

In this blog post, we talk about how to use consul-template to automate certificate management for the HashiCorp Vault PKI secrets engine.

We previously discussed how the HashiCorp Vault PKI secrets engine works to create certificates. However, we didn’t discuss how to automate the creation and renewal of certificates. This is what we cover here.

We have the same setup as before with Vault running a root and an intermediate CA. Then we configure consul-template to automatically:

  1. Authenticate to Vault
  2. Renew the Vault authentication token
  3. Create a new certificate in Vault
  4. Place the…


This post first appeared on TeKanAid’s blog.

Overview

Certificate management is not an easy task. Most system administrators dread the day they have to work on renewing a certificate. This is because of a couple of reasons:

  • It’s a manual and complex process done every few years, so it’s hard to remember everything. Therefore, you’ll find that system administrators have a method of procedure stored somewhere for when they need to go through this process again.
  • It’s risky because it may incur an outage during the process.

HashiCorp Vault’s Public Key Infrastructure (PKI) secrets engine can streamline distributing TLS certificates and…


This post first appeared on TeKanAid’s blog.

Overview

We’ve come to the fourth and final post in the blog post series called End-to-End Infrastructure and Application Deployment. Today we bring together all the concepts discussed in the three prior blog posts.

Here is what we’ve covered so far:


This post first appeared on TeKanAid’s blog.

Overview

We’ve reached our third post in the blog post series called End-to-End Infrastructure and Application Deployment. Here is what we’ve done so far:

Now let’s turn our focus to the topic of…


This post first appeared on TeKanAid’s blog.

Overview

Welcome to our second post in the blog post series called End-to-End Infrastructure and Application Deployment. In part 1, we discussed the HashiCorp Vault Azure Secrets Engine. That was the first step in securely automating our CI/CD pipeline. The purpose was to deliver Azure credentials dynamically for provisioning resources in Azure.

Our focus for this blog post is on the second step and that is to set up our CI/CD pipeline with Jenkins. This is done by following the steps below:

  1. Use Packer to build an Azure image that has Docker installed.
  2. Create…


This post first appeared on TeKanAid’s blog.

Overview

In this blog post, we talk about the HashiCorp Vault Azure Secrets Engine. This is the first blog post in a new blog post series called End-to-End Infrastructure and Application Deployment.

The goal of this series is to learn best practices around the automation of infrastructure provisioning and application deployment.

We cover the concepts of Infrastructure as Code, CI/CD, secrets management, dynamic secrets, the secret zero problem, service mesh, and more. Our cloud of choice is Azure for this series. Our focus for this blog post is on the first step and that…


This post first appeared on TeKanAid’s blog.

Overview

In this post, we discuss and demo secure sessions management for human to machine access using HashiCorp Boundary. HashiCorp Boundary is one of two recent products announced at the latest HashiConf Digital in October 2020. The other product is HashiCorp Waypoint which we’ll demo in a separate blog post.

tl;dr you can find the code for this post in the boundary intro repo. Moreover, below is a video explanation.

Video Chapters

You can skip to the relevant chapters below:

  • 00:00 Introduction
  • 02:18 Traditional Human to Machine Access Workflow
  • 05:00 Boundary’s Workflow
  • 07:55 Boundary’s…


This post first appeared on TeKanAid’s blog.

Overview

This is Part 4 and the final post of our Webblog app series. In this post, we make use of the entire HashiStack. This is similar to the previous setup used in Part 3, except that we swap Kubernetes for Nomad as our orchestrator.

As a quick recap, my goal was to learn the different HashiCorp tools by developing a web app called the Webblog app.


This post first appeared on TeKanAid’s blog.

Overview

We’ve reached Part 3 of our Webblog app series. In this post, we show how to use the Consul Connect Service Mesh with our Webblog app. As a reminder, my goal was to learn the different HashiCorp tools by developing a web app called the Webblog app.

Sam Gabrail

DevSecOps and Infrastructure Automation Advocate

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store