Get Hands-on Experience with HashiCorp Products in Your Browser
HashiCorp Learn now features embedded interactive experiences powered by Katacoda. These in-page tutorials allow readers to have an immediate hands-on experience with HashiCorp products without leaving the Learn site.
HashiCorp started developing Katacoda scenarios even before the debut of HashiCorp Learn, but those two experiences were not integrated. Now, each Katacoda scenario is embedded into its corresponding guide to make the learning experience even more engaging.
The video below shows a demo of this new feature.
Using these scenarios, you can explore product features without any local installation or setup.
In the last 30 days, users have engaged with over 5,000 HashiCorp Katacoda sessions. Visit one of the guides listed below to experience it for yourself!
» Guides with interactive tutorials
Currently, the following guides have an embedded Katacoda scenario:
- Vault Agent Templates
- Encryption as a Service: Transit Secrets Engine
- AppRole Pull Authentication
- Identity: Entities and Groups
- Vault Policies
- ACL Policy Path Templating
- Vault HA Cluster with Integrated Storage
- Cubbyhole Response Wrapping
- Static Secrets: Key/Value Secrets Engine
- Versioned Key/Value Secrets Engine
- Vault Tokens
- Direct Application Integration
- Generate Root Tokens Using Unseal Keys
- Rekeying & Rotating Vault
Subscribe to this blog for monthly updates on new content on HashiCorp Learn.
Sign up for the latest HashiCorp news
More blog posts like this one

HashiCorp and Red Hat, better together
The IBM acquisition of HashiCorp sets up a vision for more tightly integrating HashiCorp Terraform and Vault with Red Hat Ansible and OpenShift
Vault Enterprise 1.19 reduces risk with encryption updates and automated root rotation
Reduce risk and improve efficiency with Vault 1.19 updates including automated root rotation, encryption updates, and an improved UI.

3 cybersecurity stories from 2024 that show what we need to do in 2025
The majority of attacks in 2025 aren’t going to be related to AI or use zero-days. They’ll continue to focus on the easiest exploits, including exposed credentials and user access patterns.