Nathan Basanese
                                            Nathan Basanese
                                        
                                    // , The only question is how a user would get practice with modifying and diagnosing problems with Vault. But I think the advantages outweigh the disadvantages, and even getting...
// , I've put the provisioning data in the provision_vault/data and provision_consul/data folders, and the scripts which use that data are in the provision_vault/scripts and provision_consul/scripts folders, respectively.
// , HERE BE DRAGONS. Warning, this is more complex than other stuff in this repo. There are a lot of other solutions out there, and HashiCorp may already be...
// , Here are some existing solutions to this, which automate the provisioning of Vault's internal features via its API: https://www.hashicorp.com/blog/codifying-vault-policies-and-configuration https://tech.spaceapegames.com/2017/07/26/vault-configuration-as-code/
// , @mrodriguezio, would you please have a go at this one?
// , Something like this might work: `ExecStart=/bin/bash -c '/usr/bin/journalctl --no-tail -f -o json > /var/journald_file'` Splunk and others can't handle the binary format of SystemD journals: https://www.freedesktop.org/wiki/Software/systemd/journal-files/
// , The script that was supposed to set up the connection to MariaDB is here: https://github.com/v6/super-duper-vault-train/blob/develop/demonstrations/mariadb.sh And it's called by the following: https://github.com/v6/super-duper-vault-train/blob/develop/Vagrantfile#L40-L62
// , I don't think so. The VM hosting the machine is up, right?
@simba23 will review. Thanks for the contributions, man! It's a great addition because it shows how simple the TLS setup can be. Just generate the certificates, put them in a...
This branch doesn't have the updates from @pranta. I'll need to rebase and merge to make sure this is done on top of the latest `develop`. Please keep this in...