DZone
DevOps Zone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
  • Refcardz
  • Trend Reports
  • Webinars
  • Zones
  • |
    • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • DevOps
    • Integration
    • IoT
    • Java
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
DZone > DevOps Zone > Migrating Secrets Using HashiCorp Vault and Safe CLI

Migrating Secrets Using HashiCorp Vault and Safe CLI

In this post, we will go through the steps of migrating secrets from one vault to another using Vault and Safe CLI.

Upanshu Chaudhary user avatar by
Upanshu Chaudhary
CORE ·
May. 04, 22 · DevOps Zone · Code Snippet
Like (4)
Save
Tweet
5.49K Views

Join the DZone community and get the full member experience.

Join For Free

Vault and Safe

Vault is a secret management service by HashiCorp. It is a tool that will help you in storing secrets (API keys, passwords, etc.) and accessing them securely. You can use Vault with a user interface as well as through CLI. 

In this post, we will not be going deep into what Vault is, but instead, will look at how we can migrate secrets from one Vault to another. We can migrate secrets from Vault using Vault CLI, but it can get a little complicated to do so. Therefore, to make things easy, we will use Safe CLI, which is a wrapper around Vault. It will help us in managing and migrating our secrets by using simple commands. It also helps us connect to different vault instances very quickly for migration purposes.

For more detailed information about Safe CLI, go through their README.

For this demo, we will migrate secrets from one Vault to another. I obviously will not be using a production-grade Vault, but spin up a local vault dev server provided by Vault itself for getting familiar with Vault. You can check out how to spin up a dev server here.

Getting Started

Before starting with Safe, we need to connect to Vault with secrets, the target vault, and retrieve tokens. These tokens will be used by Safe for authenticating.

Below is the method to login to Vault:

 
export VAULT_ADDR=<vault_url>
export VAULT_SKIP_VERIFY=<true/false>
export VAULT_CLIENT_CERT=<vault_client_cert_path>
export VAULT_CLIENT_KEY=<vault_client_key_path>
export VAULT_CA_CERT=<vault_ca_cert_path>
export VAULT_TOKEN=$(vault login -method=cert -token-only)
vault login -method=cert


Once you are logged in, the vault will return a token. Save this token, as it will be used by Safe to log in the vaults.

Install Safe CLI from here. You can get the safe binaries here. If you are on a Linux machine like me, you can use this command.

 
wget  https://github.com/starkandwayne/safe/releases/tag/v1.6.1


Once it is installed, give permission to the executable with the following:

 
chmod u+x <executable name>


You can add an alias for Safe in .bashrc for easy use of CLI.

The first step towards migration through Safe will be to add vault instances in Safe. Safe adds Vault instances as targets.

We will first add the vault which contains our secret.

 
safe target <vault_adress> <vault_name>


In case you want to skip this verification, pass -k:

 
safe target -k <vault_adress> <vault_name>


To connect to this address, we need to authenticate. The most common way to authenticate is to use a token, but you can authenticate in different ways as well. 

 
safe auth token


Once you have added the token you can check the env variables to make sure that added values are correct using:

 
safe env --bash


For more information on authentication and different commands please go through the Safe CLI README.

Repeat the same steps to connect to the target vault to which you want to migrate your secrets to.

Migrating Secrets

In case the paths for both vaults are the same, you can import the secrets with a single command:

 
safe -T <target> export <path> | safe -T <target_vault> import <path>


Import secrets with single command

In case the paths for both vaults are different, you will need to do it manually using these steps:

 
safe -T <target> export <path>


This will echo the secrets. Copy them into a file and change the key value to the new path.

Import the updated secrets with new paths using the command:

 
Safe import < ./<filename>


You can check the secret tree by pointing to the wanted target.

 
Safe tree <path>


These steps should help you complete your migration easily.  You can check out my other posts here.

Command-line interface

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Choosing Between REST and GraphQL
  • Take Control of Your Application Security
  • An Overview of 3 Java Embedded Databases
  • SDLC Vs STLC: What's the Difference?

Comments

DevOps Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • MVB Program
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends:

DZone.com is powered by 

AnswerHub logo