Secrets Mount Redis Elasticach
Constructors
Properties
A list of roles that are allowed to use this connection.
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Supported list of database secrets engines that can be configured:
Specifies the name of the plugin to use.
A list of database statements to be executed to rotate the root user's credentials.
The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
The maximum amount of time in seconds allowed to complete a rotation when a scheduled token rotation occurs. The default rotation window is unbound and the minimum allowable window is 3600
. Requires Vault Enterprise 1.19+.
Whether the connection should be verified on initial configuration or not.