NEW Boundary on the HashiCorp Cloud Platform is now in public beta Learn more
  • Infrastructure
    • terraform
    • packer
  • Networking
    • consul
  • Security
    • vault
    • boundary
  • Applications
    • nomad
    • waypoint
    • vagrant
  • HashiCorp Cloud Platform

    A fully managed platform to automate infrastructure on any cloud with HashiCorp products.

    • consul
    • terraform
    • vault
    • packerbeta
    Visit cloud.hashicorp.com
  • Overview
  • Tutorials
  • Docs
  • API
  • Community
GitHub—Stars on GitHub
Download
    • v0.9.x (latest)
    • v0.8.x
    • v0.7.x
    • v0.6.x
    • v0.5.x
    • v0.4.x
    • v0.3.x
    • v0.2.x
    • v0.1.x
  • What is Boundary?
    • Overview
      • Overview
      • Production
    • Deploy and Login
    • Connect to Target
    • Overview/Top-Level Parameters
      • Overview
      • PKI Workers
      • KMS Workers OSS Only
      • Overview
      • TCP
      • Unix
      • Overview
      • AEAD
      • AWS KMS
      • AliCloud KMS
      • Azure Key Vault
      • GCP Cloud KMS
      • OCI KMS
      • Vault Transit
      • Overview
      • Common Sink Parameters
      • File Sink
      • Stderr Sink
    • controller OSS Only
    • plugins OSS Only
    • Overview
    • Service Discovery
      • Overview
        • Overview
        • Assignable Permissions
        • Permission Grant Formats
        • Resource Table
      • Data Encryption
      • Connections/TLS
      • Overview
      • Accounts
      • Auth Methods
      • Credentials
      • Credential Libraries
      • Credential Stores
      • Groups
      • Hosts
      • Host Catalogs
      • Host Sets
      • Managed Groups
      • Scopes
      • Sessions
      • Session Connections
      • Targets
      • Roles
      • Users
      • Overview
      • OIDC Managed Groups
      • Resource Listing
      • Worker Tags
      • Events
  • Common Workflows
    • Overview
    • Manage Roles
    • Manage Scopes
    • Manage Sessions
    • Manage Targets
    • Manage Users and Groups
    • Workflow SSH Proxy
    • Overview
    • API
    • CLI
    • Go SDK
    • Desktop
    • Desktop

    • Overview
      • Overview
      • Dev Mode
      • Run and Login
      • Connect to Dev Target
      • Non-Dev Environments
      • Systemd Install
      • Postgres Install
      • High Availability Install
      • Reference Architectures
      • Overview
      • Metrics
      • Health Endpoint
      • Overview
      • Building
      • Developing the UI

  • Roadmap
    • Overview
    • v0.9.0
    • v0.8.0
    • v0.7.0
    • v0.6.0
    • v0.5.0
    • v0.4.0
    • v0.3.0
    • v0.2.0
    • v0.1.0
Type '/' to Search

»What is Dev Mode?

Before getting started with Boundary OSS, it's important to understand a few key concepts. Please consult our Boundary concepts page to familiarize yourself with Boundary's architecture and terminology.

Dev mode is a method for getting started with Boundary quickly for testing and learning purposes. As the name implies, dev mode is not a production installation method, and provides a way to get Boundary running with a Postgres database easily. Do not use dev mode in a production environment, see the Production Installation section for production-ready deployment methods.

Dev mode brings up a fully-functioning instance of Boundary, including:

  • A controller server
  • A worker server
  • A Postgres database

These components should all be considered ephemeral - no data persistence occurs across dev mode restarts. Along with these external components, dev mode also creates several resources within Boundary to make it easier and faster to connect to your first target:

  1. An org scope and a project scope with a default ID of o_1234567890 and p_1234567890 respectively.
  2. A password auth method with a default auth method ID of ampw_1234567890.
  3. An OIDC auth method with a default auth method ID of amoidc_1234567890.
  4. An admin user with login name admin and password password.
  5. An unprivileged user with login name user and password password.
  6. A static host catalog with a default ID of hcst_1234567890.
  7. A static host and host set with default ID's of hst_1234567890 and hsst_1234567890 respectively.
  8. A TCP target with a default ID of ttcp_1234567890.

The default ID suffixes can be overwritten or randomly generated, and there are many other dev mode controls. To see a complete list of these override flags, consult boundary dev -h.

If you plan on provisioning a large number of resources in dev mode, it's strongly recommended that users leverage our Terraform Provider for Boundary for managing configuration of Boundary. This will simplify starting up and shutting down your Boundary dev instance.

»Requirements

There are a few requirements for running dev mode:

  • Docker is installed
  • A route to download the Postgres Docker image is available or a local image cache is available
  • A Boundary binary in your $PATH
  • Optionally, an installation of Boundary Desktop if you want to use the desktop examples
github logoEdit this page
DocsLearnPrivacySecurityPress KitConsent Manager