published on Tuesday, Mar 31, 2026 by Pulumi
published on Tuesday, Mar 31, 2026 by Pulumi
Creates a Nomad Secret Backend for Vault. The Nomad secret backend for Vault generates Nomad ACL tokens dynamically based on pre-existing Nomad ACL policies.
Important All data provided in the resource configuration will be written in cleartext to state and plan files generated by Terraform, and will appear in the console output when Terraform runs. Protect these artifacts accordingly. See the main provider documentation for more details.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const config = new vault.NomadSecretBackend("config", {
backend: "nomad",
description: "test description",
defaultLeaseTtlSeconds: 3600,
maxLeaseTtlSeconds: 7200,
maxTtl: 240,
address: "https://127.0.0.1:4646",
token: "ae20ceaa-...",
ttl: 120,
});
import pulumi
import pulumi_vault as vault
config = vault.NomadSecretBackend("config",
backend="nomad",
description="test description",
default_lease_ttl_seconds=3600,
max_lease_ttl_seconds=7200,
max_ttl=240,
address="https://127.0.0.1:4646",
token="ae20ceaa-...",
ttl=120)
package main
import (
"github.com/pulumi/pulumi-vault/sdk/v7/go/vault"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := vault.NewNomadSecretBackend(ctx, "config", &vault.NomadSecretBackendArgs{
Backend: pulumi.String("nomad"),
Description: pulumi.String("test description"),
DefaultLeaseTtlSeconds: pulumi.Int(3600),
MaxLeaseTtlSeconds: pulumi.Int(7200),
MaxTtl: pulumi.Int(240),
Address: pulumi.String("https://127.0.0.1:4646"),
Token: pulumi.String("ae20ceaa-..."),
Ttl: pulumi.Int(120),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var config = new Vault.NomadSecretBackend("config", new()
{
Backend = "nomad",
Description = "test description",
DefaultLeaseTtlSeconds = 3600,
MaxLeaseTtlSeconds = 7200,
MaxTtl = 240,
Address = "https://127.0.0.1:4646",
Token = "ae20ceaa-...",
Ttl = 120,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.NomadSecretBackend;
import com.pulumi.vault.NomadSecretBackendArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var config = new NomadSecretBackend("config", NomadSecretBackendArgs.builder()
.backend("nomad")
.description("test description")
.defaultLeaseTtlSeconds(3600)
.maxLeaseTtlSeconds(7200)
.maxTtl(240)
.address("https://127.0.0.1:4646")
.token("ae20ceaa-...")
.ttl(120)
.build());
}
}
resources:
config:
type: vault:NomadSecretBackend
properties:
backend: nomad
description: test description
defaultLeaseTtlSeconds: '3600'
maxLeaseTtlSeconds: '7200'
maxTtl: '240'
address: https://127.0.0.1:4646
token: ae20ceaa-...
ttl: '120'
Ephemeral Attributes Reference
The following write-only attributes are supported:
clientKeyWo- (Optional) Write-only client certificate key to provide to the Nomad server, must be x509 PEM encoded. Use this for enhanced security when you don’t want the client key to appear in state files. RequiresclientKeyWoVersion. Conflicts withclientKey. Note: This property is write-only and will not be read from the API.tokenWo- (Optional) Write-only Nomad Management token to use. Use this for enhanced security when you don’t want the token to appear in state files. RequirestokenWoVersion. Conflicts withtoken. Note: This property is write-only and will not be read from the API.
Create NomadSecretBackend Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new NomadSecretBackend(name: string, args?: NomadSecretBackendArgs, opts?: CustomResourceOptions);@overload
def NomadSecretBackend(resource_name: str,
args: Optional[NomadSecretBackendArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def NomadSecretBackend(resource_name: str,
opts: Optional[ResourceOptions] = None,
address: Optional[str] = None,
allowed_managed_keys: Optional[Sequence[str]] = None,
allowed_response_headers: Optional[Sequence[str]] = None,
audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
backend: Optional[str] = None,
ca_cert: Optional[str] = None,
client_cert: Optional[str] = None,
client_key: Optional[str] = None,
client_key_wo: Optional[str] = None,
client_key_wo_version: Optional[int] = None,
default_lease_ttl_seconds: Optional[int] = None,
delegated_auth_accessors: Optional[Sequence[str]] = None,
description: Optional[str] = None,
disable_remount: Optional[bool] = None,
external_entropy_access: Optional[bool] = None,
force_no_cache: Optional[bool] = None,
identity_token_key: Optional[str] = None,
listing_visibility: Optional[str] = None,
local: Optional[bool] = None,
max_lease_ttl_seconds: Optional[int] = None,
max_token_name_length: Optional[int] = None,
max_ttl: Optional[int] = None,
namespace: Optional[str] = None,
options: Optional[Mapping[str, str]] = None,
passthrough_request_headers: Optional[Sequence[str]] = None,
plugin_version: Optional[str] = None,
seal_wrap: Optional[bool] = None,
token: Optional[str] = None,
token_wo: Optional[str] = None,
token_wo_version: Optional[int] = None,
ttl: Optional[int] = None)func NewNomadSecretBackend(ctx *Context, name string, args *NomadSecretBackendArgs, opts ...ResourceOption) (*NomadSecretBackend, error)public NomadSecretBackend(string name, NomadSecretBackendArgs? args = null, CustomResourceOptions? opts = null)
public NomadSecretBackend(String name, NomadSecretBackendArgs args)
public NomadSecretBackend(String name, NomadSecretBackendArgs args, CustomResourceOptions options)
type: vault:NomadSecretBackend
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args NomadSecretBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args NomadSecretBackendArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args NomadSecretBackendArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args NomadSecretBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args NomadSecretBackendArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
NomadSecretBackend Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The NomadSecretBackend resource accepts the following input properties:
- Address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- Allowed
Managed List<string>Keys - List of managed key registry entry names that the mount in question is allowed to access
- Allowed
Response List<string>Headers - List of headers to allow and pass from the request to the plugin
- Audit
Non List<string>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- Audit
Non List<string>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- Backend string
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - Ca
Cert string - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- Client
Cert string - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- Client
Key string - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - Client
Key stringWo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- Client
Key intWo Version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - Default
Lease intTtl Seconds - Default lease duration for secrets in seconds.
- Delegated
Auth List<string>Accessors - List of headers to allow and pass from the request to the plugin
- Description string
- Human-friendly description of the mount for the backend.
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- External
Entropy boolAccess - Enable the secrets engine to access Vault's external entropy source
- Force
No boolCache - If set to true, disables caching.
- Identity
Token stringKey - The key to use for signing plugin workload identity tokens
- Listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- Local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- Max
Lease intTtl Seconds - Maximum possible lease duration for secrets in seconds.
- Max
Token intName Length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- Max
Ttl int - Maximum possible lease duration for secrets in seconds.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - Options Dictionary<string, string>
- Specifies mount type specific options that are passed to the backend
- Passthrough
Request List<string>Headers - List of headers to allow and pass from the request to the plugin
- Plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- Seal
Wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- Token string
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - Token
Wo string - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- Token
Wo intVersion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - Ttl int
- Specifies the ttl of the lease for the generated token.
- Address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- Allowed
Managed []stringKeys - List of managed key registry entry names that the mount in question is allowed to access
- Allowed
Response []stringHeaders - List of headers to allow and pass from the request to the plugin
- Audit
Non []stringHmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- Audit
Non []stringHmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- Backend string
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - Ca
Cert string - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- Client
Cert string - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- Client
Key string - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - Client
Key stringWo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- Client
Key intWo Version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - Default
Lease intTtl Seconds - Default lease duration for secrets in seconds.
- Delegated
Auth []stringAccessors - List of headers to allow and pass from the request to the plugin
- Description string
- Human-friendly description of the mount for the backend.
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- External
Entropy boolAccess - Enable the secrets engine to access Vault's external entropy source
- Force
No boolCache - If set to true, disables caching.
- Identity
Token stringKey - The key to use for signing plugin workload identity tokens
- Listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- Local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- Max
Lease intTtl Seconds - Maximum possible lease duration for secrets in seconds.
- Max
Token intName Length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- Max
Ttl int - Maximum possible lease duration for secrets in seconds.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - Options map[string]string
- Specifies mount type specific options that are passed to the backend
- Passthrough
Request []stringHeaders - List of headers to allow and pass from the request to the plugin
- Plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- Seal
Wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- Token string
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - Token
Wo string - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- Token
Wo intVersion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - Ttl int
- Specifies the ttl of the lease for the generated token.
- address String
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- allowed
Managed List<String>Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response List<String>Headers - List of headers to allow and pass from the request to the plugin
- audit
Non List<String>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non List<String>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- backend String
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - ca
Cert String - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- client
Cert String - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- client
Key String - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - client
Key StringWo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- client
Key IntegerWo Version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - default
Lease IntegerTtl Seconds - Default lease duration for secrets in seconds.
- delegated
Auth List<String>Accessors - List of headers to allow and pass from the request to the plugin
- description String
- Human-friendly description of the mount for the backend.
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- external
Entropy BooleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No BooleanCache - If set to true, disables caching.
- identity
Token StringKey - The key to use for signing plugin workload identity tokens
- listing
Visibility String - Specifies whether to show this mount in the UI-specific listing endpoint
- local Boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- max
Lease IntegerTtl Seconds - Maximum possible lease duration for secrets in seconds.
- max
Token IntegerName Length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- max
Ttl Integer - Maximum possible lease duration for secrets in seconds.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Map<String,String>
- Specifies mount type specific options that are passed to the backend
- passthrough
Request List<String>Headers - List of headers to allow and pass from the request to the plugin
- plugin
Version String - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- seal
Wrap Boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- token String
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - token
Wo String - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- token
Wo IntegerVersion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - ttl Integer
- Specifies the ttl of the lease for the generated token.
- address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- allowed
Managed string[]Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response string[]Headers - List of headers to allow and pass from the request to the plugin
- audit
Non string[]Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non string[]Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- backend string
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - ca
Cert string - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- client
Cert string - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- client
Key string - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - client
Key stringWo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- client
Key numberWo Version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - default
Lease numberTtl Seconds - Default lease duration for secrets in seconds.
- delegated
Auth string[]Accessors - List of headers to allow and pass from the request to the plugin
- description string
- Human-friendly description of the mount for the backend.
- disable
Remount boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- external
Entropy booleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No booleanCache - If set to true, disables caching.
- identity
Token stringKey - The key to use for signing plugin workload identity tokens
- listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- local boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- max
Lease numberTtl Seconds - Maximum possible lease duration for secrets in seconds.
- max
Token numberName Length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- max
Ttl number - Maximum possible lease duration for secrets in seconds.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - options {[key: string]: string}
- Specifies mount type specific options that are passed to the backend
- passthrough
Request string[]Headers - List of headers to allow and pass from the request to the plugin
- plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- seal
Wrap boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- token string
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - token
Wo string - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- token
Wo numberVersion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - ttl number
- Specifies the ttl of the lease for the generated token.
- address str
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- allowed_
managed_ Sequence[str]keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed_
response_ Sequence[str]headers - List of headers to allow and pass from the request to the plugin
- audit_
non_ Sequence[str]hmac_ request_ keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit_
non_ Sequence[str]hmac_ response_ keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- backend str
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - ca_
cert str - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- client_
cert str - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- client_
key str - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - client_
key_ strwo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- client_
key_ intwo_ version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - default_
lease_ intttl_ seconds - Default lease duration for secrets in seconds.
- delegated_
auth_ Sequence[str]accessors - List of headers to allow and pass from the request to the plugin
- description str
- Human-friendly description of the mount for the backend.
- disable_
remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- external_
entropy_ boolaccess - Enable the secrets engine to access Vault's external entropy source
- force_
no_ boolcache - If set to true, disables caching.
- identity_
token_ strkey - The key to use for signing plugin workload identity tokens
- listing_
visibility str - Specifies whether to show this mount in the UI-specific listing endpoint
- local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- max_
lease_ intttl_ seconds - Maximum possible lease duration for secrets in seconds.
- max_
token_ intname_ length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- max_
ttl int - Maximum possible lease duration for secrets in seconds.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Mapping[str, str]
- Specifies mount type specific options that are passed to the backend
- passthrough_
request_ Sequence[str]headers - List of headers to allow and pass from the request to the plugin
- plugin_
version str - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- seal_
wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- token str
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - token_
wo str - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- token_
wo_ intversion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - ttl int
- Specifies the ttl of the lease for the generated token.
- address String
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- allowed
Managed List<String>Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response List<String>Headers - List of headers to allow and pass from the request to the plugin
- audit
Non List<String>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non List<String>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- backend String
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - ca
Cert String - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- client
Cert String - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- client
Key String - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - client
Key StringWo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- client
Key NumberWo Version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - default
Lease NumberTtl Seconds - Default lease duration for secrets in seconds.
- delegated
Auth List<String>Accessors - List of headers to allow and pass from the request to the plugin
- description String
- Human-friendly description of the mount for the backend.
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- external
Entropy BooleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No BooleanCache - If set to true, disables caching.
- identity
Token StringKey - The key to use for signing plugin workload identity tokens
- listing
Visibility String - Specifies whether to show this mount in the UI-specific listing endpoint
- local Boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- max
Lease NumberTtl Seconds - Maximum possible lease duration for secrets in seconds.
- max
Token NumberName Length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- max
Ttl Number - Maximum possible lease duration for secrets in seconds.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Map<String>
- Specifies mount type specific options that are passed to the backend
- passthrough
Request List<String>Headers - List of headers to allow and pass from the request to the plugin
- plugin
Version String - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- seal
Wrap Boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- token String
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - token
Wo String - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- token
Wo NumberVersion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - ttl Number
- Specifies the ttl of the lease for the generated token.
Outputs
All input properties are implicitly available as output properties. Additionally, the NomadSecretBackend resource produces the following output properties:
Look up Existing NomadSecretBackend Resource
Get an existing NomadSecretBackend resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: NomadSecretBackendState, opts?: CustomResourceOptions): NomadSecretBackend@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
accessor: Optional[str] = None,
address: Optional[str] = None,
allowed_managed_keys: Optional[Sequence[str]] = None,
allowed_response_headers: Optional[Sequence[str]] = None,
audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
backend: Optional[str] = None,
ca_cert: Optional[str] = None,
client_cert: Optional[str] = None,
client_key: Optional[str] = None,
client_key_wo: Optional[str] = None,
client_key_wo_version: Optional[int] = None,
default_lease_ttl_seconds: Optional[int] = None,
delegated_auth_accessors: Optional[Sequence[str]] = None,
description: Optional[str] = None,
disable_remount: Optional[bool] = None,
external_entropy_access: Optional[bool] = None,
force_no_cache: Optional[bool] = None,
identity_token_key: Optional[str] = None,
listing_visibility: Optional[str] = None,
local: Optional[bool] = None,
max_lease_ttl_seconds: Optional[int] = None,
max_token_name_length: Optional[int] = None,
max_ttl: Optional[int] = None,
namespace: Optional[str] = None,
options: Optional[Mapping[str, str]] = None,
passthrough_request_headers: Optional[Sequence[str]] = None,
plugin_version: Optional[str] = None,
seal_wrap: Optional[bool] = None,
token: Optional[str] = None,
token_wo: Optional[str] = None,
token_wo_version: Optional[int] = None,
ttl: Optional[int] = None) -> NomadSecretBackendfunc GetNomadSecretBackend(ctx *Context, name string, id IDInput, state *NomadSecretBackendState, opts ...ResourceOption) (*NomadSecretBackend, error)public static NomadSecretBackend Get(string name, Input<string> id, NomadSecretBackendState? state, CustomResourceOptions? opts = null)public static NomadSecretBackend get(String name, Output<String> id, NomadSecretBackendState state, CustomResourceOptions options)resources: _: type: vault:NomadSecretBackend get: id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Accessor string
- Accessor of the mount
- Address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- Allowed
Managed List<string>Keys - List of managed key registry entry names that the mount in question is allowed to access
- Allowed
Response List<string>Headers - List of headers to allow and pass from the request to the plugin
- Audit
Non List<string>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- Audit
Non List<string>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- Backend string
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - Ca
Cert string - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- Client
Cert string - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- Client
Key string - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - Client
Key stringWo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- Client
Key intWo Version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - Default
Lease intTtl Seconds - Default lease duration for secrets in seconds.
- Delegated
Auth List<string>Accessors - List of headers to allow and pass from the request to the plugin
- Description string
- Human-friendly description of the mount for the backend.
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- External
Entropy boolAccess - Enable the secrets engine to access Vault's external entropy source
- Force
No boolCache - If set to true, disables caching.
- Identity
Token stringKey - The key to use for signing plugin workload identity tokens
- Listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- Local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- Max
Lease intTtl Seconds - Maximum possible lease duration for secrets in seconds.
- Max
Token intName Length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- Max
Ttl int - Maximum possible lease duration for secrets in seconds.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - Options Dictionary<string, string>
- Specifies mount type specific options that are passed to the backend
- Passthrough
Request List<string>Headers - List of headers to allow and pass from the request to the plugin
- Plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- Seal
Wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- Token string
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - Token
Wo string - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- Token
Wo intVersion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - Ttl int
- Specifies the ttl of the lease for the generated token.
- Accessor string
- Accessor of the mount
- Address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- Allowed
Managed []stringKeys - List of managed key registry entry names that the mount in question is allowed to access
- Allowed
Response []stringHeaders - List of headers to allow and pass from the request to the plugin
- Audit
Non []stringHmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- Audit
Non []stringHmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- Backend string
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - Ca
Cert string - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- Client
Cert string - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- Client
Key string - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - Client
Key stringWo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- Client
Key intWo Version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - Default
Lease intTtl Seconds - Default lease duration for secrets in seconds.
- Delegated
Auth []stringAccessors - List of headers to allow and pass from the request to the plugin
- Description string
- Human-friendly description of the mount for the backend.
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- External
Entropy boolAccess - Enable the secrets engine to access Vault's external entropy source
- Force
No boolCache - If set to true, disables caching.
- Identity
Token stringKey - The key to use for signing plugin workload identity tokens
- Listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- Local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- Max
Lease intTtl Seconds - Maximum possible lease duration for secrets in seconds.
- Max
Token intName Length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- Max
Ttl int - Maximum possible lease duration for secrets in seconds.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - Options map[string]string
- Specifies mount type specific options that are passed to the backend
- Passthrough
Request []stringHeaders - List of headers to allow and pass from the request to the plugin
- Plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- Seal
Wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- Token string
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - Token
Wo string - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- Token
Wo intVersion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - Ttl int
- Specifies the ttl of the lease for the generated token.
- accessor String
- Accessor of the mount
- address String
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- allowed
Managed List<String>Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response List<String>Headers - List of headers to allow and pass from the request to the plugin
- audit
Non List<String>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non List<String>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- backend String
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - ca
Cert String - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- client
Cert String - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- client
Key String - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - client
Key StringWo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- client
Key IntegerWo Version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - default
Lease IntegerTtl Seconds - Default lease duration for secrets in seconds.
- delegated
Auth List<String>Accessors - List of headers to allow and pass from the request to the plugin
- description String
- Human-friendly description of the mount for the backend.
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- external
Entropy BooleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No BooleanCache - If set to true, disables caching.
- identity
Token StringKey - The key to use for signing plugin workload identity tokens
- listing
Visibility String - Specifies whether to show this mount in the UI-specific listing endpoint
- local Boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- max
Lease IntegerTtl Seconds - Maximum possible lease duration for secrets in seconds.
- max
Token IntegerName Length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- max
Ttl Integer - Maximum possible lease duration for secrets in seconds.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Map<String,String>
- Specifies mount type specific options that are passed to the backend
- passthrough
Request List<String>Headers - List of headers to allow and pass from the request to the plugin
- plugin
Version String - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- seal
Wrap Boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- token String
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - token
Wo String - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- token
Wo IntegerVersion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - ttl Integer
- Specifies the ttl of the lease for the generated token.
- accessor string
- Accessor of the mount
- address string
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- allowed
Managed string[]Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response string[]Headers - List of headers to allow and pass from the request to the plugin
- audit
Non string[]Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non string[]Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- backend string
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - ca
Cert string - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- client
Cert string - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- client
Key string - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - client
Key stringWo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- client
Key numberWo Version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - default
Lease numberTtl Seconds - Default lease duration for secrets in seconds.
- delegated
Auth string[]Accessors - List of headers to allow and pass from the request to the plugin
- description string
- Human-friendly description of the mount for the backend.
- disable
Remount boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- external
Entropy booleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No booleanCache - If set to true, disables caching.
- identity
Token stringKey - The key to use for signing plugin workload identity tokens
- listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- local boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- max
Lease numberTtl Seconds - Maximum possible lease duration for secrets in seconds.
- max
Token numberName Length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- max
Ttl number - Maximum possible lease duration for secrets in seconds.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - options {[key: string]: string}
- Specifies mount type specific options that are passed to the backend
- passthrough
Request string[]Headers - List of headers to allow and pass from the request to the plugin
- plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- seal
Wrap boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- token string
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - token
Wo string - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- token
Wo numberVersion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - ttl number
- Specifies the ttl of the lease for the generated token.
- accessor str
- Accessor of the mount
- address str
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- allowed_
managed_ Sequence[str]keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed_
response_ Sequence[str]headers - List of headers to allow and pass from the request to the plugin
- audit_
non_ Sequence[str]hmac_ request_ keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit_
non_ Sequence[str]hmac_ response_ keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- backend str
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - ca_
cert str - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- client_
cert str - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- client_
key str - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - client_
key_ strwo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- client_
key_ intwo_ version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - default_
lease_ intttl_ seconds - Default lease duration for secrets in seconds.
- delegated_
auth_ Sequence[str]accessors - List of headers to allow and pass from the request to the plugin
- description str
- Human-friendly description of the mount for the backend.
- disable_
remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- external_
entropy_ boolaccess - Enable the secrets engine to access Vault's external entropy source
- force_
no_ boolcache - If set to true, disables caching.
- identity_
token_ strkey - The key to use for signing plugin workload identity tokens
- listing_
visibility str - Specifies whether to show this mount in the UI-specific listing endpoint
- local bool
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- max_
lease_ intttl_ seconds - Maximum possible lease duration for secrets in seconds.
- max_
token_ intname_ length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- max_
ttl int - Maximum possible lease duration for secrets in seconds.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Mapping[str, str]
- Specifies mount type specific options that are passed to the backend
- passthrough_
request_ Sequence[str]headers - List of headers to allow and pass from the request to the plugin
- plugin_
version str - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- seal_
wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- token str
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - token_
wo str - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- token_
wo_ intversion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - ttl int
- Specifies the ttl of the lease for the generated token.
- accessor String
- Accessor of the mount
- address String
- Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646".
- allowed
Managed List<String>Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response List<String>Headers - List of headers to allow and pass from the request to the plugin
- audit
Non List<String>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non List<String>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- backend String
- The unique path this backend should be mounted at. Must
not begin or end with a
/. Defaults tonomad. - ca
Cert String - CA certificate to use when verifying the Nomad server certificate, must be x509 PEM encoded.
- client
Cert String - Client certificate to provide to the Nomad server, must be x509 PEM encoded.
- client
Key String - Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
Conflicts with
clientKeyWo. - client
Key StringWo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
- client
Key NumberWo Version - Version counter for the write-only client key. This must be incremented
each time the
clientKeyWovalue is changed to trigger an update. Required when usingclientKeyWo. - default
Lease NumberTtl Seconds - Default lease duration for secrets in seconds.
- delegated
Auth List<String>Accessors - List of headers to allow and pass from the request to the plugin
- description String
- Human-friendly description of the mount for the backend.
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- external
Entropy BooleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No BooleanCache - If set to true, disables caching.
- identity
Token StringKey - The key to use for signing plugin workload identity tokens
- listing
Visibility String - Specifies whether to show this mount in the UI-specific listing endpoint
- local Boolean
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
- max
Lease NumberTtl Seconds - Maximum possible lease duration for secrets in seconds.
- max
Token NumberName Length - Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version.
- max
Ttl Number - Maximum possible lease duration for secrets in seconds.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Map<String>
- Specifies mount type specific options that are passed to the backend
- passthrough
Request List<String>Headers - List of headers to allow and pass from the request to the plugin
- plugin
Version String - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- seal
Wrap Boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- token String
- Specifies the Nomad Management token to use. Conflicts with
tokenWo. - token
Wo String - NOTE: This field is write-only and its value will not be updated in state as part of read operations. Write-only Nomad Management token to use.
- token
Wo NumberVersion - Version counter for the write-only token. This must be incremented each time
the
tokenWovalue is changed to trigger an update. Required when usingtokenWo. - ttl Number
- Specifies the ttl of the lease for the generated token.
Import
Nomad secret backend can be imported using the backend, e.g.
$ pulumi import vault:index/nomadSecretBackend:NomadSecretBackend nomad nomad
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
vaultTerraform Provider.
published on Tuesday, Mar 31, 2026 by Pulumi
