Dev mode is not secure. Do not use it in production environments.
Prerequisites
Before you begin:- Vault CLI installed and in your
PATH. - Windows PowerShell or Command Prompt (for Windows users).
1. Starting Vault in Dev Mode
In a new shell (PowerShell or cmd), start Vault:This command runs Vault in the foreground. Open a second terminal window to interact with Vault without stopping the server.
2. Configuring Your Environment
By default, Vault listens onhttps://127.0.0.1:8200, but dev mode uses HTTP. Configure the VAULT_ADDR variable accordingly:
PowerShell:
3. Checking Vault Status
Confirm Vault is unsealed and running in-memory:Storage Type: inmem—all data resides in memory.
4. Listing Enabled Secrets Engines
Dev mode automatically enables several secrets engines. View them with:| Path | Type | Description |
|---|---|---|
| cubbyhole/ | cubbyhole | Per-token private secret storage |
| identity/ | identity | Identity store |
| secret/ | kv | Versioned key/value secret storage (KV v2) |
| sys/ | system | System endpoints for control and debugging |
5. Writing and Reading KV Secrets
The KV (Key/Value) engine is mounted atsecret/.
-
Write a secret:
Sample response:
-
Read the secret back:
Example output:
6. Cleaning Up
When you stop the dev server (e.g.,Ctrl+C), all in-memory data is lost—ideal for ephemeral testing.
Every restart returns Vault to a clean slate.
Next Steps
- Explore additional Vault Dev Mode capabilities.
- Integrate with the AWS Secrets Engine for dynamic credentials.
- Practice writing policies and managing access control in dev mode.