Evoke command reference
This reference describes currently-supported commands for the Conjur Evoke configuration utility.
Backup
Creates an encrypted back up of the Conjur Server, that contains both the archive and the encryption key needed to unlock the archive.
|
This command outputs both the archive and its encryption key to /opt/conjur/backup
.
CA
Certificate authority related commands.
Import
Import a certificate generated by a third-party CA. If the file argument is -
then the certificate is read from stdin
.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Force potentially destructive operations. |
Potentially destructive operations are not forced. |
|
Optional path to the key to import. |
The key is not imported. |
|
Import a root certificate (chain). |
The root certificate (chain) is not imported. |
|
Restart services after processing. |
The services are restarted. |
|
Set as the TLS certificate of this host. |
The imported certificate is not set as the TLS certificate of this host. |
Issue
Issue a new certificate.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Force potentially destructive operations. |
Potentially destructive operations are not forced. |
Regenerate
Regenerate the Leader certificate, for example, to add new altnames. This command is applicable to self-signed certificates only. For more information, see Self-signed certificates.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Force potentially destructive operations. |
Potentially destructive operations are not forced. |
|
Replace altnames instead of adding new ones. |
Existing altname is unchanged. |
|
Restart services after processing. |
The services are restarted. |
Audit forwarding
Manage Follower certificates for audit forwarding authentication.
Add
Add a trusted Follower certificate by DNS name. The certificate must be already imported with evoke ca import
.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Remove any existing certificates with the same DNS name. |
Existing certificates are not removed. |
|
Force removal of existing certificates. |
Existing certificates are not forcibly removed. |
List
Print the trusted Follower certificate fingerprints.
|
Options
Flag |
Description |
Default |
---|---|---|
|
The DNS name of the Follower. |
None |
|
SHA-1 fingerprint. |
None |
Remove
Remove a trusted Follower certificate by either DNS name or SHA-1 fingerprint.
|
Options
Flag |
Description |
Default |
---|---|---|
|
The DNS name of the Follower. |
None |
|
SHA-1 fingerprint. |
None |
|
Force removal of multiple matches |
Multiple matches are not removed. |
Conjur cluster
Conjur cluster commands.
Enroll
Enroll this node in the named Conjur cluster.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Name of the Conjur cluster Leader. |
The cluster Leader is used from the seed file. |
|
Name for this machine in the Conjur cluster. |
Value from the |
|
Re-enroll this machine in the Conjur cluster. |
The node is not re-enrolled. |
Member
Commands for managing auto-failover Conjur cluster members.
Add
Add a member to the current auto-failover Conjur cluster.
|
List
List members of the current auto-failover Conjur cluster.
|
Remove
Remove a member from the current auto-failover Conjur cluster, by name or auto-failover cluster member id.
|
Configuration
Commands to manage node configuration settings in the conjur.yml
file.
For more information on how Conjur applies configuration settings, see Manage Conjur configuration.
The |
Apply
Run this command to apply configuration settings in the conjur.yml
file. This command must be run on each node.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Displays help for this command. |
Help is not displayed. |
|
Verifies only the correct syntax of configuration variables. The following codes are returned:
When done, run this command again, without |
Configuration variables are applied without running a test. |
Show
Run this command to view a list of configuration settings and values, including the source where the applied configuration originated.
Since this command pulls the current settings from environment variables and the configuration file, the settings displayed do not reflect the current run state of nodes. This is because a new configuration could have been updated, but not yet applied to a node. |
|
Options
Flag |
Description |
Default |
---|---|---|
|
Displays help for this command. |
Help is not displayed. |
|
Format of output can be either: json or text. |
Text |
Declare nodes
Commands to configure a Conjur node to operate as a Leader, Follower, or Standby. These commands are run once, when you set up a new node. The command installs the necessary files into the correct locations and starts the system processes that comprise a Leader, Follower, or Standby node.
Master
Configures a Conjur Leader.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Accept the CyberArk EULA. |
Interactively prompt for EULA. |
|
Alternative DNS names for Followers, separated by commas. |
Additional alternative names are not specified. |
|
Set the name for the Leader internal system account. We do not recommend using this account to configure the Conjur Leader.
|
system |
|
Hostname
Domain names can contain a maximum of 63 characters. |
n/a |
|
Extended JSON attributes. |
Extended attributes from a JSON file are not used. |
|
Alternative DNS names for the Leader, comma-separated. |
|
|
Password for
|
n/a |
Follower
Configures a Conjur Follower.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Extended JSON attributes. |
Extended attributes from a JSON file are not used. |
|
Leader port. |
443 |
Standby
Configures a Conjur Standby.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Leader address. |
The Leader address from the seed file is not used. |
|
Leader IP address. This option is deprecated. Use |
The Leader address from the seed file is not used. |
|
Extended JSON attributes. |
Extended attributes from a JSON file are not used. |
|
Leader port. |
443 |
EULA
Display the CyberArk Software End User License Agreement (EULA).
Show
Print the EULA content to the terminal.
|
Help
Shows a list of commands or help for one command. Provides help for the application or its commands. Can also list the commands in a way that is helpful to creating a bash-style completion function.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Lists commands, one per line, to assist with shell completion. |
Show full command help. |
Keys
Commands to lock and unlock server keys.
Decrypt
Decrypt a server key.
The optional master-key-file
command argument is either a file that contains the 32-byte binary master key, or the dash -
character, which signifies that the master key should be read from stdin
. The master key can also be obtained automatically from a configured facility.
|
Decrypt all
Decrypts all the encrypted key material and restores the plain text files.
The optional master-key-file
command argument is either a file which contains the 32-byte binary master key, or the dash -
character, which signifies that the master key should be read from stdin
. The master key can also be obtained automatically from a configured facility.
|
Encrypt
Encrypt the server keys.
When the keys are encrypted, the server keys are replaced with their encrypted counterparts. The master key can subsequently be used to unlock the server keys and make them available to the Conjur service. If the master key is lost, the server keys are lost as well and the encrypted data is irrevocably lost.
The optional master-key-file
command argument is either a file that contains the 32-byte binary master key, or the dash -
character, which signifies that the master key should be read from stdin
. The master key can also be obtained automatically from a configured facility.
|
Exec
Run a child process with the unlocked keys in the keyring.
The optional master-key-file
command argument is either a file which contains the 32-byte binary master key, or the dash -
character, which signifies that the master key should be read from stdin
. The master key can also be obtained automatically from a configured facility.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Propagate the master key itself, as the |
The master key is not propagated. |
KMS
Commands to manage AWS KMS ciphertextBlobs for master key encryption. For more information, see Encrypt the master key using AWS KMS.
Set
Write the KMS ciphertextBlob to the local file system.
|
Flag |
Description |
Default |
---|---|---|
|
The AWS region to which the KMS CMK belongs. |
n/a |
|
A file containing the base64-encoded ciphertextBlob, or the dash |
n/a |
|
Optional flag that overwrites the existing ciphertextBlob. |
n/a |
|
Optional flag that verifies the node is able to decrypt the ciphertextBlob prior to writing it to the file system. |
n/a |
Delete
Delete a KMS ciphertextBlob from the file system for a specific region.
|
Flag |
Description |
Default |
---|---|---|
|
The AWS region to which the KMS CMK belongs. |
n/a |
List
List all the KMS ciphertextBlob on the local file system.
|
Validate
Validate that the KMS ciphertextBlob can be decrypted.
|
Flag |
Description |
Default |
---|---|---|
|
The AWS region to which the KMS CMK belongs. |
n/a |
Lock
Lock the server keys.
This command revokes the decrypted server keys from the conjur
kernel keyring.
|
Show master key
Obtain and print the master key.
In certain scenarios, the master key can be obtained automatically (for example from an HSM or Amazon KMS). This command attempts to retrieve and print the master key.
|
Unlock
Unlock the server keys.
This command should be performed after evoke keys encrypt
. It accepts the master key (from HSM, KMS, file or stdin
for -
), and decrypts the keys and places them into the conjur
kernel keyring. This enables the Conjur services to access the decrypted keys and start up.
The optional master-key-file
command argument is either a file that contains the 32-byte binary master key, or the dash-
character, which signifies that the master key should be read from stdin
. The master key can also be obtained automatically from a configured facility.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Avoid restarting services after processing. |
The services are left in their current state. |
PKCS11
PKCS#11 token configuration.
Generate
Generate a master key wrapping key.
Generate a new master key wrapping key in the configured PKCS#11 token. For convenience, the token is initialized if required.
|
Status
Show PKCS#11 status.
Print details about the configured PKCS#11 library, token and wrapping key, and check whether a matching wrapped master key can be found.
|
Wrap
Wrap the master key.
Wrap the Conjur master key using configured PKCS#11 token and key. The Conjur master key can be obtained by other mechanisms or it can be generated.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Force generation of a new master key, even if one can be found. |
A new master key is not generated. |
|
Prevent generation of a new master key, even if none can be found. |
A new master key is generated if one cannot be found. |
Proxy
To maintain backwards compatibility, we continue to support the |
When Conjur receives an incoming HTTP request, it examines the client's IP address. By default, if this address is non-routable, it is assumed to come from a proxy or load balancer. You can change this behavior by changing the address ranges that are considered non-routable.
Add
Add one or more trusted proxy CIDRs.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Don't print informational messages. |
Informational messages are printed. |
|
Restart services after processing. |
Services are restarted. |
List
List trusted proxy CIDRs.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Don't print informational messages. |
Services are restarted. |
Remove
Remove one or more trusted proxy CIDRs.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Don't print informational messages. |
Informational messages are printed. |
|
Restart services after processing. |
Services are restarted. |
Unset
Unset all trusted proxy CIDRs, returning to the default behavior.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Restart services after processing. |
Services are restarted. |
Replication
Server replication commands.
Rebase
Change the replication Leader.
Switches the replication Leader of this machine. The new Leader is indicated by the master-ip
argument. In order for this operation to succeed, the new Leader must be running a compatible Postgres timeline, and its replication log must not be behind this machine.
To test whether a particular Leader is a valid replication Leader, use the --dry-run
flag.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Check whether the machine identified by the |
A dry run does not occur. |
Stop
Stop replicating.
|
Sync
Control the use of synchronous replication.
Disable
Disable synchronous replication on this standby.
When synchronous replication is disabled on a standby, it is not eligible to be selected as the synchronous standby. When synchronous replication is started on the Leader, this standby will never be chosen.
|
Enable
Enable synchronous replication on this standby.
When synchronous replication is enabled on a standby, it is eligible to be selected as the synchronous standby when synchronous replication is started on the Leader.
|
Start
Start synchronous replication. Switches the replication mode to synchronous replication.
In synchronous replication mode, the server commits all changes to at least one replica before responding. For this reason, a standby is required for this mode. At least two standbys are recommended, as losing the last standby in synchronous mode renders the server unable to handle requests.
You can use the |
|
Flag |
Description |
Default |
---|---|---|
|
Force to synchronous mode even when too few standbys are present. |
Synchronous mode is not forced if there are too few standbys. |
Stop
Stop synchronous replication. Switches the replication mode to asynchronous replication, which is the default setting.
In asynchronous replication mode, the server doesn't wait for a replica to synchronize before responding. This means if the server goes down in the meantime, there could be changes that haven't been replicated but have been confirmed to a client.
|
Replication set
Provides basic operations for replication sets.
Create
Create a new replication set for use in data segregation per Follower.
Replication set names can contain a maximum of 42 characters.
evoke replication-set create <replication-set-name>
Delete
Deletes the specified replication set.
evoke replication-set delete [command options] <replication-set-name>
Options
Flag |
Description |
Default |
---|---|---|
|
Deletes the replication set without prompting the user to confirm the deletion. |
Without this flag, the command prompts the user to confirm the deletion. |
List
List all replication sets.
evoke replication-set list [command options]
Options
Flag |
Description |
Default |
---|---|---|
|
Specifies the output format of the list as either text or JSON format. |
Text, which returns human-readable YAML output. |
Restore
Restore a server from backup. Restores a server from a previously-created backup. Unless otherwise noted, backup and restore can be safely performed across releases of Conjur.
Before issuing the |
|
Options
Flag |
Description |
Default |
---|---|---|
|
Accept the CyberArk EULA. |
Interactively prompt for EULA. |
|
Sets the internal system account name for the Leader. |
system |
|
Extended JSON attributes. |
Extended attributes from a JSON file are not used. |
|
Displays the Conjur policy roles that will be removed during the upgrade process, without actually executing the upgrade. It will list the actions the real migration will take. Always confirm that the roles are no longer used before proceeding without the You can use shell commands to put the output in a text file for offline review. |
Not applicable |
Role
Server role commands.
Promote
Promote a server from standby to Leader.
|
Show
Show the current server role (default setting).
|
Seed
Seed generation.
Follower
Generate a Follower seed.
Generate a seed file, which contains the configuration, cryptographic keys, SSL certificate and private key for a Follower with a given DNS name. The Follower DNS name is generally a virtual IP, (e.g. a load balancer). Additional arguments are used as alternate names when generating the certificate.
When configured, the Follower connects to the Leader using the Leader's primary DNS name. This can be overridden using the configure command's master-ip
option.
The output of this command is a tar file printed to stdout
. Note that if the stdin
of this command has a tty
, the tar output may be corrupt.
|
Options
Flag |
Description |
Default |
---|---|---|
|
The DNS name of the Follower. Domain names can contain a maximum of 63 characters. |
None |
|
Force removal of existing Follower certificates. |
Existing Follower certificates are not forcibly removed. |
|
Remove any existing Follower certificates from mutual TLS for audit forwarding. |
Existing Follower certificates from mutual TLS for audit forwarding are not removed. |
|
Name of the replication set to use for data segregation per Follower.
The following values are not allowed and will result in an error if used:
|
Full If you do not specify a replication set, it defaults to full and all secrets are replicated to the Follower. |
If you accidentally remove a trusted certificate, run the |
Standby
Generate a standby Leader seed.
Generate a seed file that contains configuration and cryptographic keys for a standby Leader. The standby inherits its hostname, certificate, and private key from the Leader.
When configured, the standby connects to the Leader using the its primary DNS name. This can be overridden using the configure command's master-address
option.
The output of this command is a tar file printed to stdout
.
If the |
|
Unpack
Archive unpacking.
Backup
Unpack a backup file.
If the key is specified as-
, then it is read from stdin
. The evoke restore
command can subsequently be performed without any required options.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Encryption key for the backup.
|
n/a |
Seed
Unpack a seed file.
If the seed file name is specified as -
, then it is read from stdin
. The evoke configure (standby|follower)
command can subsequently be performed without any required options.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Private key file (if not included in the seed). |
Attempt to use key from the seed file. |
Variable
Configure environment variables that control the operation of Conjur services.
To maintain backwards compatibility, we continue to support the |
List
List values of some or all environment variables.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Don't print informational messages. |
Informational messages are printed. |
Set
Set the value of a variable.
This command only modifies the current (running) Conjur container. If you are upgrading to a new version of Conjur, previously configured variables DO NOT persist as a new container image is used for the new release. Be sure to reapply your configured variables (e.g. authenticators) after you've finished the upgrade. Additionally, there is known issue with Leader cluster promotions/failovers. When a Standby is promoted to Leader, configuration set using this command is lost. If you need configuration settings to persist, set environment variables instead when launching the Conjur container with the |
|
Options
Flag |
Description |
Default |
---|---|---|
|
Don't print informational messages. |
Informational messages are printed. |
|
Restart services after processing. |
Services are restarted. |
Unset
Unset the value of a variable.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Don't print informational messages. |
Informational messages are printed. |
|
Restart services after processing. |
Services are restarted. |
Wait
Wait for Conjur to be ready for requests.
|
Options
Flag |
Description |
Default |
---|---|---|
|
Ignore Conjur cluster status in determining health. |
Do not ignore cluster status. |
|
The number of seconds to wait before timeout. |
90 seconds. |