Vault
Vault Interactive Sandboxes
Experiment with HashiCorp products in a safe, pre-configured environment.
HashiCorp Sandboxes provide interactive environments where you can experiment with HashiCorp products without any installation or setup. They're perfect for:
- Learning how products work in a real environment
- Testing configurations and commands without affecting your systems
- Exploring product features in a safe sandbox
- Following along with tutorials and documentation
Each sandbox comes pre-configured with everything you need to start using the product immediately. Just click on a sandbox below to launch it in your browser.
Available Vault sandboxes
When you launch a sandbox, you'll be presented with a terminal interface where you can interact with the pre-configured environment. The sandbox runs in your browser and doesn't require any downloads or installations.
Each sandbox session lasts for up to 1 hour, giving you plenty of time to experiment. Your work isn't saved between sessions, so be sure to copy any important configurations before your session ends.
- Vault SandboxExperiment with Vault. This sandbox contains five Vault Docker containers and a reverse proxy container.
Sandbox documentation
Warning
This environment is not production-ready, as it does not follow recommendations for production cluster deployments. Refer to these resources for more information:
This is a 5-node Vault Community edition cluster with a reverse proxy running in a Docker environment. This environment initializes Vault with a Shamir seal, and one unseal key for convenience and simplicity.
You can find container data, configuration, logs, and the plugins directory in the /home/learner/sandbox-vault/containers directory. Here are the contents of the vault_sandbox_1 container directory as an example:
.
├── certs
│ ├── server_cert.pem
│ ├── server_key.pem
│ └── vault_sandbox_ca.pem
├── config
│ └── server.hcl
├── logs
│ └── vault_audit.log
└── plugins
You can browse these files from the Code Editor tab as well.
If you need to directly access a container, you can use 'docker exec'. For example, to get a shell session in vault-1, use:
$ docker exec -i -t vault-1 sh
Export one of the following to address the Vault cluster node you need to communicate with (reverse proxy by default):
export VAULT_ADDR=https://localhost:8443# Active node via reverse proxyexport VAULT_ADDR=https://localhost:8200# Vault node 1export VAULT_ADDR=https://localhost:8220# Vault node 2export VAULT_ADDR=https://localhost:8230# Vault node 3export VAULT_ADDR=https://localhost:8240# Vault node 4export VAULT_ADDR=https://localhost:8250# Vault node 5
You can access the Vault UI for each node with the tabs labeled Vault 1 UI through Vault 5 UI.
The environment enables Vault server telemetry from the active node to Prometheus, and you can use Grafana to access a dashboard in the Grafana tab with these credentials:
- Username:
admin - Password:
2LearnVault
Other sandboxes
Explore sandboxes for other HashiCorp products that you might find useful.