Creates an RabbitMQ Secret Backend for Vault. RabbitMQ secret backends can then issue RabbitMQ credentials, once a role has been added to the backend.
resource "vault_rabbitmq_secret_backend" "rabbitmq" {
connection_uri = "https://....."
username = "user"
password = "password"
}
The following arguments are supported:
namespace
- (Optional) The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespace
is always relative to the provider's configured namespace.
Available only for Vault Enterprise.
connection_uri
- (Required) Specifies the RabbitMQ connection URI.
username
- (Required) Specifies the RabbitMQ management administrator username.
password
- (Required) Specifies the RabbitMQ management administrator password.
verify_connection
- (Optional) Specifies whether to verify connection URI, username, and password.
Defaults to true
.
password_policy
- (Optional) Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
username_template
- (Optional) Template describing how dynamic usernames are generated.
path
- (Optional) The unique path this backend should be mounted at. Must
not begin or end with a /
. Defaults to rabbitmq
.
disable_remount
- (Optional) If set, opts out of mount migration on path updates.
See here for more info on Mount Migration
description
- (Optional) A human-friendly description for this backend.
default_lease_ttl_seconds
- (Optional) The default TTL for credentials
issued by this backend.
max_lease_ttl_seconds
- (Optional) The maximum TTL that can be requested
for credentials issued by this backend.
No additional attributes are exported by this resource.
RabbitMQ secret backends can be imported using the path
, e.g.
$ terraform import vault_rabbitmq_secret_backend.rabbitmq rabbitmq