From 2d5e78d480ac84c6c2dda6e59e4eb0756294e457 Mon Sep 17 00:00:00 2001 From: Muhammad Atif Ali Date: Fri, 16 Feb 2024 18:40:14 +0300 Subject: [PATCH] docs: elaborate instructions for setting up hcp vault module --- hcp-vault-secrets/README.md | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/hcp-vault-secrets/README.md b/hcp-vault-secrets/README.md index c45cff6..ef94adc 100644 --- a/hcp-vault-secrets/README.md +++ b/hcp-vault-secrets/README.md @@ -23,7 +23,15 @@ module "vault" { ## Configuration -To configure the HCP Vault Secrets module, you must create an HCP Service Principal from the HCP Vault Secrets app in the HCP console. This will give you the `HCP_CLIENT_ID` and `HCP_CLIENT_SECRET` that you need to authenticate with HCP Vault Secrets. See the [HCP Vault Secrets documentation](https://developer.hashicorp.com/hcp/docs/vault-secrets) for more information. +To configure the HCP Vault Secrets module, follow these steps, +1. [Create secrets in HCP Vault Secrets +](https://developer.hashicorp.com/vault/tutorials/hcp-vault-secrets-get-started/hcp-vault-secrets-create-secret) +2. Create an HCP Service Principal from the HCP Vault Secrets app in the HCP console. This will give you the `HCP_CLIENT_ID` and `HCP_CLIENT_SECRET` that you need to authenticate with HCP Vault Secrets. + ![HCP vault secrets credentials](../.images/hcp-vault-secrets-credentials.png) +3. Set `HCP_CLIENT_ID` and `HCP_CLIENT_SECRET` variables on the coder provisioner (recommended) or supply them as input to the module. + +> See the [HCP Vault Secrets documentation](https://developer.hashicorp.com/hcp/docs/vault-secrets) for more information. + ## Fetch All Secrets