LogicMonitor seeks to disrupt AI landscape with $800M strategic investment at $2.4B valuation to revolutionize data centers.

Learn More

Integrating with Credential Vault

Last updated on 15 October, 2024

The Credential Vault integration with the collector allows storing and managing sensitive information (including credentials and secrets for hosts, devices, services, etc.) in an external credential vault. 

Collector supports the following vault integrations:

Note: Support for the Credential Vault Integration was added in EA Collector 29.108. Please take a look at the relevant vault integration topics for supported collector versions.

Integrating Credential Vault Properties

To integrate the collector with Credential Vault, follow these steps.

1. In LogicMonitor, navigate to Resource Tree > required Collector > Info tab.

2. Select Manage properties to add or edit vault metadata properties to the collector. For more information, see Adding Vault Properties.

Collector Properties

3. Navigate to Settings > Collectors.

4. Under the Collectors tab, select the collector you want to configure.  

5. In the details panel, under the Info tab, select More.

6. Select Collector Configuration.

Agen Config

7. Ensure to set the vault.bypass value to false in agent.conf.
In addition, you can add the required agent configuration properties to set the Collector. For more information, see  Collector Configurations.

Collector Configurations

The following table lists the configuration properties to set in the collector agent.conf.

PropertyTypeDefaultDescription
vault.bypassBooleanTRUEIf the value for the property is true, the vault API calls won’t happen.
Note: You must set the property to false, to enable the vault API calls.
vault.credentials.cache.expirationtimeInteger60The property specifies the value in minutes for the expiry of the credential in the vault cache on the collector. After this time, the credentials in the vault cache will expire.
vault.credentials.refresh.delayInteger15Controls the Credential Vault integration cache expiration refresh delay in seconds.
vault.url.cache.enabledBooleanFALSEThe property specifies whether the URL cache is enabled or not. By default the property is set as false; however, if the property is set to true the collector caches the URL and secret value. If the URL for lmvault property is found in the URL cache, the respective secret value is returned, else the API call is made to fetch the secret from the vault. Setting this property to ‘true’ should resolve API rate-limiting issues.
vault.url.cache.max.sizeInteger1000The property defines the number of URLs that will be stored in the cache.

Adding Vault Properties

You can add vault properties such as vault metadata and vault keys.

Vault Metadata

The following table lists the Vault Metadata properties.

PropertyDescription
vault.meta.urlThe URL of the vault. 
vault.meta.typeThe type of vault. 
vault.meta.headerThe headers are required for HTTP Get Request. The value for this custom property would be the header separated with & and the header key value separated with = as shown in the below example:
vault.meta.header – Content-Type=application/json&Accept-Encoding=gzip, deflate, br

Vault Keys

Vault keys need to be specified at the device level with suffix .lmvault. 

PropertyDescription
.lmvaultThe custom property for which value should be retrieved from the Vault must be specified at the device level by adding suffix .lmvault. The value of such property would be the path of the key in the Vault.
For example: ssh.user.lmvault = ssh\ssh.user
In This Article