vault.NomadSecretBackend
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const config = new vault.NomadSecretBackend("config", {
    backend: "nomad",
    description: "test description",
    defaultLeaseTtlSeconds: 3600,
    maxLeaseTtlSeconds: 7200,
    maxTtl: 240,
    address: "https://127.0.0.1:4646",
    token: "ae20ceaa-...",
    ttl: 120,
});
import pulumi
import pulumi_vault as vault
config = vault.NomadSecretBackend("config",
    backend="nomad",
    description="test description",
    default_lease_ttl_seconds=3600,
    max_lease_ttl_seconds=7200,
    max_ttl=240,
    address="https://127.0.0.1:4646",
    token="ae20ceaa-...",
    ttl=120)
package main
import (
	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := vault.NewNomadSecretBackend(ctx, "config", &vault.NomadSecretBackendArgs{
			Backend:                pulumi.String("nomad"),
			Description:            pulumi.String("test description"),
			DefaultLeaseTtlSeconds: pulumi.Int(3600),
			MaxLeaseTtlSeconds:     pulumi.Int(7200),
			MaxTtl:                 pulumi.Int(240),
			Address:                pulumi.String("https://127.0.0.1:4646"),
			Token:                  pulumi.String("ae20ceaa-..."),
			Ttl:                    pulumi.Int(120),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() => 
{
    var config = new Vault.NomadSecretBackend("config", new()
    {
        Backend = "nomad",
        Description = "test description",
        DefaultLeaseTtlSeconds = 3600,
        MaxLeaseTtlSeconds = 7200,
        MaxTtl = 240,
        Address = "https://127.0.0.1:4646",
        Token = "ae20ceaa-...",
        Ttl = 120,
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.NomadSecretBackend;
import com.pulumi.vault.NomadSecretBackendArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var config = new NomadSecretBackend("config", NomadSecretBackendArgs.builder()
            .backend("nomad")
            .description("test description")
            .defaultLeaseTtlSeconds(3600)
            .maxLeaseTtlSeconds(7200)
            .maxTtl(240)
            .address("https://127.0.0.1:4646")
            .token("ae20ceaa-...")
            .ttl(120)
            .build());
    }
}
resources:
  config:
    type: vault:NomadSecretBackend
    properties:
      backend: nomad
      description: test description
      defaultLeaseTtlSeconds: '3600'
      maxLeaseTtlSeconds: '7200'
      maxTtl: '240'
      address: https://127.0.0.1:4646
      token: ae20ceaa-...
      ttl: '120'
Create NomadSecretBackend Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new NomadSecretBackend(name: string, args?: NomadSecretBackendArgs, opts?: CustomResourceOptions);@overload
def NomadSecretBackend(resource_name: str,
                       args: Optional[NomadSecretBackendArgs] = None,
                       opts: Optional[ResourceOptions] = None)
@overload
def NomadSecretBackend(resource_name: str,
                       opts: Optional[ResourceOptions] = None,
                       address: Optional[str] = None,
                       backend: Optional[str] = None,
                       ca_cert: Optional[str] = None,
                       client_cert: Optional[str] = None,
                       client_key: Optional[str] = None,
                       default_lease_ttl_seconds: Optional[int] = None,
                       description: Optional[str] = None,
                       disable_remount: Optional[bool] = None,
                       local: Optional[bool] = None,
                       max_lease_ttl_seconds: Optional[int] = None,
                       max_token_name_length: Optional[int] = None,
                       max_ttl: Optional[int] = None,
                       namespace: Optional[str] = None,
                       token: Optional[str] = None,
                       ttl: Optional[int] = None)func NewNomadSecretBackend(ctx *Context, name string, args *NomadSecretBackendArgs, opts ...ResourceOption) (*NomadSecretBackend, error)public NomadSecretBackend(string name, NomadSecretBackendArgs? args = null, CustomResourceOptions? opts = null)
public NomadSecretBackend(String name, NomadSecretBackendArgs args)
public NomadSecretBackend(String name, NomadSecretBackendArgs args, CustomResourceOptions options)
type: vault:NomadSecretBackend
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args NomadSecretBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args NomadSecretBackendArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args NomadSecretBackendArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args NomadSecretBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args NomadSecretBackendArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var nomadSecretBackendResource = new Vault.NomadSecretBackend("nomadSecretBackendResource", new()
{
    Address = "string",
    Backend = "string",
    CaCert = "string",
    ClientCert = "string",
    ClientKey = "string",
    DefaultLeaseTtlSeconds = 0,
    Description = "string",
    DisableRemount = false,
    Local = false,
    MaxLeaseTtlSeconds = 0,
    MaxTokenNameLength = 0,
    MaxTtl = 0,
    Namespace = "string",
    Token = "string",
    Ttl = 0,
});
example, err := vault.NewNomadSecretBackend(ctx, "nomadSecretBackendResource", &vault.NomadSecretBackendArgs{
	Address:                pulumi.String("string"),
	Backend:                pulumi.String("string"),
	CaCert:                 pulumi.String("string"),
	ClientCert:             pulumi.String("string"),
	ClientKey:              pulumi.String("string"),
	DefaultLeaseTtlSeconds: pulumi.Int(0),
	Description:            pulumi.String("string"),
	DisableRemount:         pulumi.Bool(false),
	Local:                  pulumi.Bool(false),
	MaxLeaseTtlSeconds:     pulumi.Int(0),
	MaxTokenNameLength:     pulumi.Int(0),
	MaxTtl:                 pulumi.Int(0),
	Namespace:              pulumi.String("string"),
	Token:                  pulumi.String("string"),
	Ttl:                    pulumi.Int(0),
})
var nomadSecretBackendResource = new NomadSecretBackend("nomadSecretBackendResource", NomadSecretBackendArgs.builder()
    .address("string")
    .backend("string")
    .caCert("string")
    .clientCert("string")
    .clientKey("string")
    .defaultLeaseTtlSeconds(0)
    .description("string")
    .disableRemount(false)
    .local(false)
    .maxLeaseTtlSeconds(0)
    .maxTokenNameLength(0)
    .maxTtl(0)
    .namespace("string")
    .token("string")
    .ttl(0)
    .build());
nomad_secret_backend_resource = vault.NomadSecretBackend("nomadSecretBackendResource",
    address="string",
    backend="string",
    ca_cert="string",
    client_cert="string",
    client_key="string",
    default_lease_ttl_seconds=0,
    description="string",
    disable_remount=False,
    local=False,
    max_lease_ttl_seconds=0,
    max_token_name_length=0,
    max_ttl=0,
    namespace="string",
    token="string",
    ttl=0)
const nomadSecretBackendResource = new vault.NomadSecretBackend("nomadSecretBackendResource", {
    address: "string",
    backend: "string",
    caCert: "string",
    clientCert: "string",
    clientKey: "string",
    defaultLeaseTtlSeconds: 0,
    description: "string",
    disableRemount: false,
    local: false,
    maxLeaseTtlSeconds: 0,
    maxTokenNameLength: 0,
    maxTtl: 0,
    namespace: "string",
    token: "string",
    ttl: 0,
});
type: vault:NomadSecretBackend
properties:
    address: string
    backend: string
    caCert: string
    clientCert: string
    clientKey: string
    defaultLeaseTtlSeconds: 0
    description: string
    disableRemount: false
    local: false
    maxLeaseTtlSeconds: 0
    maxTokenNameLength: 0
    maxTtl: 0
    namespace: string
    token: string
    ttl: 0
NomadSecretBackend Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The NomadSecretBackend resource accepts the following input properties:
- Address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- Backend string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- CaCert string
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- ClientCert string
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- ClientKey string
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- DefaultLease intTtl Seconds 
- Default lease duration for secrets in seconds.
- Description string
- Human-friendly description of the mount for the Active Directory backend.
- DisableRemount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- MaxLease intTtl Seconds 
- Maximum possible lease duration for secrets in seconds.
- MaxToken intName Length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- MaxTtl int
- Maximum possible lease duration for secrets in seconds.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Token string
- Specifies the Nomad Management token to use.
- Ttl int
- Specifies the ttl of the lease for the generated token.
- Address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- Backend string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- CaCert string
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- ClientCert string
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- ClientKey string
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- DefaultLease intTtl Seconds 
- Default lease duration for secrets in seconds.
- Description string
- Human-friendly description of the mount for the Active Directory backend.
- DisableRemount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- MaxLease intTtl Seconds 
- Maximum possible lease duration for secrets in seconds.
- MaxToken intName Length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- MaxTtl int
- Maximum possible lease duration for secrets in seconds.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Token string
- Specifies the Nomad Management token to use.
- Ttl int
- Specifies the ttl of the lease for the generated token.
- address String
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- backend String
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- caCert String
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- clientCert String
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- clientKey String
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- defaultLease IntegerTtl Seconds 
- Default lease duration for secrets in seconds.
- description String
- Human-friendly description of the mount for the Active Directory backend.
- disableRemount Boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- local Boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- maxLease IntegerTtl Seconds 
- Maximum possible lease duration for secrets in seconds.
- maxToken IntegerName Length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- maxTtl Integer
- Maximum possible lease duration for secrets in seconds.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- token String
- Specifies the Nomad Management token to use.
- ttl Integer
- Specifies the ttl of the lease for the generated token.
- address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- backend string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- caCert string
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- clientCert string
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- clientKey string
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- defaultLease numberTtl Seconds 
- Default lease duration for secrets in seconds.
- description string
- Human-friendly description of the mount for the Active Directory backend.
- disableRemount boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- local boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- maxLease numberTtl Seconds 
- Maximum possible lease duration for secrets in seconds.
- maxToken numberName Length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- maxTtl number
- Maximum possible lease duration for secrets in seconds.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- token string
- Specifies the Nomad Management token to use.
- ttl number
- Specifies the ttl of the lease for the generated token.
- address str
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- backend str
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- ca_cert str
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- client_cert str
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- client_key str
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- default_lease_ intttl_ seconds 
- Default lease duration for secrets in seconds.
- description str
- Human-friendly description of the mount for the Active Directory backend.
- disable_remount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- max_lease_ intttl_ seconds 
- Maximum possible lease duration for secrets in seconds.
- max_token_ intname_ length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- max_ttl int
- Maximum possible lease duration for secrets in seconds.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- token str
- Specifies the Nomad Management token to use.
- ttl int
- Specifies the ttl of the lease for the generated token.
- address String
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- backend String
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- caCert String
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- clientCert String
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- clientKey String
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- defaultLease NumberTtl Seconds 
- Default lease duration for secrets in seconds.
- description String
- Human-friendly description of the mount for the Active Directory backend.
- disableRemount Boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- local Boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- maxLease NumberTtl Seconds 
- Maximum possible lease duration for secrets in seconds.
- maxToken NumberName Length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- maxTtl Number
- Maximum possible lease duration for secrets in seconds.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- token String
- Specifies the Nomad Management token to use.
- ttl Number
- Specifies the ttl of the lease for the generated token.
Outputs
All input properties are implicitly available as output properties. Additionally, the NomadSecretBackend resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing NomadSecretBackend Resource
Get an existing NomadSecretBackend resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: NomadSecretBackendState, opts?: CustomResourceOptions): NomadSecretBackend@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        address: Optional[str] = None,
        backend: Optional[str] = None,
        ca_cert: Optional[str] = None,
        client_cert: Optional[str] = None,
        client_key: Optional[str] = None,
        default_lease_ttl_seconds: Optional[int] = None,
        description: Optional[str] = None,
        disable_remount: Optional[bool] = None,
        local: Optional[bool] = None,
        max_lease_ttl_seconds: Optional[int] = None,
        max_token_name_length: Optional[int] = None,
        max_ttl: Optional[int] = None,
        namespace: Optional[str] = None,
        token: Optional[str] = None,
        ttl: Optional[int] = None) -> NomadSecretBackendfunc GetNomadSecretBackend(ctx *Context, name string, id IDInput, state *NomadSecretBackendState, opts ...ResourceOption) (*NomadSecretBackend, error)public static NomadSecretBackend Get(string name, Input<string> id, NomadSecretBackendState? state, CustomResourceOptions? opts = null)public static NomadSecretBackend get(String name, Output<String> id, NomadSecretBackendState state, CustomResourceOptions options)resources:  _:    type: vault:NomadSecretBackend    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- Backend string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- CaCert string
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- ClientCert string
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- ClientKey string
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- DefaultLease intTtl Seconds 
- Default lease duration for secrets in seconds.
- Description string
- Human-friendly description of the mount for the Active Directory backend.
- DisableRemount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- MaxLease intTtl Seconds 
- Maximum possible lease duration for secrets in seconds.
- MaxToken intName Length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- MaxTtl int
- Maximum possible lease duration for secrets in seconds.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Token string
- Specifies the Nomad Management token to use.
- Ttl int
- Specifies the ttl of the lease for the generated token.
- Address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- Backend string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- CaCert string
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- ClientCert string
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- ClientKey string
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- DefaultLease intTtl Seconds 
- Default lease duration for secrets in seconds.
- Description string
- Human-friendly description of the mount for the Active Directory backend.
- DisableRemount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- MaxLease intTtl Seconds 
- Maximum possible lease duration for secrets in seconds.
- MaxToken intName Length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- MaxTtl int
- Maximum possible lease duration for secrets in seconds.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Token string
- Specifies the Nomad Management token to use.
- Ttl int
- Specifies the ttl of the lease for the generated token.
- address String
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- backend String
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- caCert String
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- clientCert String
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- clientKey String
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- defaultLease IntegerTtl Seconds 
- Default lease duration for secrets in seconds.
- description String
- Human-friendly description of the mount for the Active Directory backend.
- disableRemount Boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- local Boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- maxLease IntegerTtl Seconds 
- Maximum possible lease duration for secrets in seconds.
- maxToken IntegerName Length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- maxTtl Integer
- Maximum possible lease duration for secrets in seconds.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- token String
- Specifies the Nomad Management token to use.
- ttl Integer
- Specifies the ttl of the lease for the generated token.
- address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- backend string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- caCert string
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- clientCert string
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- clientKey string
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- defaultLease numberTtl Seconds 
- Default lease duration for secrets in seconds.
- description string
- Human-friendly description of the mount for the Active Directory backend.
- disableRemount boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- local boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- maxLease numberTtl Seconds 
- Maximum possible lease duration for secrets in seconds.
- maxToken numberName Length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- maxTtl number
- Maximum possible lease duration for secrets in seconds.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- token string
- Specifies the Nomad Management token to use.
- ttl number
- Specifies the ttl of the lease for the generated token.
- address str
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- backend str
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- ca_cert str
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- client_cert str
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- client_key str
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- default_lease_ intttl_ seconds 
- Default lease duration for secrets in seconds.
- description str
- Human-friendly description of the mount for the Active Directory backend.
- disable_remount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- max_lease_ intttl_ seconds 
- Maximum possible lease duration for secrets in seconds.
- max_token_ intname_ length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- max_ttl int
- Maximum possible lease duration for secrets in seconds.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- token str
- Specifies the Nomad Management token to use.
- ttl int
- Specifies the ttl of the lease for the generated token.
- address String
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- backend String
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults tonomad.
- caCert String
- CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- clientCert String
- Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- clientKey String
- Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
- defaultLease NumberTtl Seconds 
- Default lease duration for secrets in seconds.
- description String
- Human-friendly description of the mount for the Active Directory backend.
- disableRemount Boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- local Boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
- maxLease NumberTtl Seconds 
- Maximum possible lease duration for secrets in seconds.
- maxToken NumberName Length 
- Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- maxTtl Number
- Maximum possible lease duration for secrets in seconds.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- token String
- Specifies the Nomad Management token to use.
- ttl Number
- Specifies the ttl of the lease for the generated token.
Import
Nomad secret backend can be imported using the backend, e.g.
$ pulumi import vault:index/nomadSecretBackend:NomadSecretBackend nomad nomad
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the vaultTerraform Provider.