Secrets Mount Elasticsearch Args
Constructors
Properties
A list of roles that are allowed to use this connection.
The path to the certificate for the Elasticsearch client to present for communication
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Supported list of database secrets engines that can be configured:
Specifies the name of the plugin to use.
A list of database statements to be executed to rotate the root user's credentials.
The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
The maximum amount of time in seconds allowed to complete a rotation when a scheduled token rotation occurs. The default rotation window is unbound and the minimum allowable window is 3600
. Requires Vault Enterprise 1.19+.
This, if set, is used to set the SNI host when connecting via TLS
Template describing how dynamic usernames are generated.
Whether the connection should be verified on initial configuration or not.