Several of this year’s HashiTalks showcased useful strategies and use cases for HashiCorp Vault and Boundary. Watch the videos here.
In our first three HashiTalks 2022 blogs, we spotlighted talks on observability, Consul-Terraform-Sync, HashiCorp Nomad experimentation, Kubernetes integrations, and case studies. Today we’re highlighting talks focused on tips and strategies for HashiCorp Vault, HashiCorp Boundary, and implementing zero trust security.
Glynn Forrest shares what he’s learned building tools that add static typing to Vault secrets, and how they can help teams work together with Vault in a more reliable way. These tools can help put Vault secrets in a standardized format that your applications are expecting so they don’t break. Here is the code from the demo for this talk.
Nick Young guides you through the considerations, approaches, and pitfalls of an upgrade migration to Vault Enterprise and presents a demo that shows how to upgrade an existing open source Vault cluster to Vault Enterprise with hardware security module (HSM) integration.
Guy Barros shows how you can use Terraform to codify Vault's JWT/OIDC auth methods using GitLab, Okta, and GitHub. This demo-driven session starts with a helpful mental model and includes a Git repo to unify JWT/OIDC Vault auth Terraform projects and a repo containing Terraform code to automate the creation of Vault JWT auth for GitHub Actions.
Laurentius Purba believes upgrading your HashiCorp Vault instance should be clean, manageable, and reversible. In this talk, Laurentius explores how Vault failover can help you upgrade your existing Vault deployment and shows you how to perform upgrades on open source Vault using this method.
Elif Mosessohn-Samedin and Andrei Buzoianu share how their organization leveraged HashiCorp Vault to instrument Kubernetes and Restic as an end-to-end secure data-backup solution that protects data during transit and at rest.
Suman Chakraborty explains how HashiCorp Boundary abstracts away the complexity of granting and maintaining access to infrastructure resources, providing a linear approach. Traditional approaches such as VPNs, bastion hosts, and gateway nodes are often chosen to bridge connections between private and public networks, but these are complex and expensive to set up. Boundary provides a more modern way to access hosts and critical systems without having to manage credentials or expose your network.
We’ve already posted HashiTalks 2022 highlight blogs covering Nomad explorations, observability, Consul-Terraform-Sync, Kubernetes integration, and case studies. Our final highlights blog will include videos covering Terraform tips and strategies, Terraform CI/CD, and Packer image pipelines.
AWS re:Invent 2022 is here. We highlighted what’s new with Terraform and AWS — like Launch Day support for new AWS services in the Terraform AWS Provider.
Read our recap of HashiCorp security and networking news and developments on AWS from this past year.
The HashiCorp Terraform AWS provider has surpassed one billion downloads — here’s how we got there, and what to look for next.