All Projects → hashicorp → Terraform Google Vault

hashicorp / Terraform Google Vault

Licence: apache-2.0
A Terraform Module for how to run Vault on Google Cloud using Terraform and Packer

Labels

Projects that are alternatives of or similar to Terraform Google Vault

Nomadfiles
A collection of Nomad job files for deploying applications to a cluster
Stars: ✭ 89 (-17.59%)
Mutual labels:  hcl
Example Pragmatic Terraform
『実践Terraform』のサンプルコード
Stars: ✭ 99 (-8.33%)
Mutual labels:  hcl
Libvirt K8s Provisioner
Automate your k8s installation
Stars: ✭ 106 (-1.85%)
Mutual labels:  hcl
Hashidays Nyc
Code accompanying my talk at HashiDays New York, 2017
Stars: ✭ 91 (-15.74%)
Mutual labels:  hcl
Cobalt
Infrastructure turn-key solution for app service workloads
Stars: ✭ 97 (-10.19%)
Mutual labels:  hcl
Typhoon
Minimal and free Kubernetes distribution with Terraform
Stars: ✭ 1,397 (+1193.52%)
Mutual labels:  hcl
Terraform Azurerm Aks
Terraform Module for deploying an AKS cluster
Stars: ✭ 87 (-19.44%)
Mutual labels:  hcl
Aws Ecs Airflow
Run Airflow in AWS ECS(Elastic Container Service) using Fargate tasks
Stars: ✭ 107 (-0.93%)
Mutual labels:  hcl
Terraform Example
Terraform, Ansible, sticky tape and magic
Stars: ✭ 98 (-9.26%)
Mutual labels:  hcl
Spinnaker Terraform
A set of terraform scripts to create an environment from scratch with a Bastion Host, Jenkins, and Spinnaker
Stars: ✭ 106 (-1.85%)
Mutual labels:  hcl
Terraform 0.12 Examples
Some Terraform 0.12 Examples
Stars: ✭ 92 (-14.81%)
Mutual labels:  hcl
Vaultron
🤖 Vault clusters Terraformed onto Docker for great fun and learning!
Stars: ✭ 96 (-11.11%)
Mutual labels:  hcl
Hcledit
A command line editor for HCL
Stars: ✭ 104 (-3.7%)
Mutual labels:  hcl
Pci Gke Blueprint
PCI on GKE Blueprint: PCI Deployable Architecture on Google Cloud and GKE
Stars: ✭ 91 (-15.74%)
Mutual labels:  hcl
Solutions Terraform Cloudbuild Gitops
Stars: ✭ 106 (-1.85%)
Mutual labels:  hcl
Clarity
A declaritive test framework for Terraform
Stars: ✭ 88 (-18.52%)
Mutual labels:  hcl
Aws Minikube
Single node Kubernetes instance implemented using Terraform and kubeadm
Stars: ✭ 101 (-6.48%)
Mutual labels:  hcl
Terraform Aws Config
Enables AWS Config and adds managed config rules with good defaults.
Stars: ✭ 107 (-0.93%)
Mutual labels:  hcl
Aws Accounts Terraform
Stars: ✭ 108 (+0%)
Mutual labels:  hcl
Terraform Aws Dynamic Subnets
Terraform module for public and private subnets provisioning in existing VPC
Stars: ✭ 106 (-1.85%)
Mutual labels:  hcl

Maintained by Gruntwork.io Terraform Version

Vault for Google Cloud Platform (GCP)

This repo contains a Terraform Module for how to deploy a Vault cluster on GCP using Terraform. Vault is an open source tool for managing secrets. This Module uses GCS as a storage backend and a Consul server cluster as a high availability backend:

Vault architecture

This Module includes the following submodules:

  • install-vault: This module can be used to install Vault. It can be used in a Packer template to create a Vault Google Image.

  • run-vault: This module can be used to configure and run Vault. It can be used in a Startup Script to fire up Vault while the server is booting.

  • install-nginx: This module can be used to install Nginx. It can be used in a Packer template to create a Vault Google Image. This module is only necessary when using a Load Balancer which requires a Health Checker.

  • run-nginx: This module can be used to configure and run nginx. It can be used in a Startup Script to launch nginx while the server is booting.

  • vault-cluster: Terraform code to deploy a cluster of Vault servers using a Managed Instance Group.

  • vault-lb-fr: Configures a Regional External Load Balancer in front of Vault if you need to access it from the public Internet.

  • private-tls-cert: Generate a private TLS certificate for use with a private Vault cluster.

  • update-certificate-store: Add a trusted, CA public key to an OS's certificate store. This allows you to establish TLS connections to services that use this TLS certs signed by this CA without getting x509 certificate errors.

What's a Terraform Module?

A Terraform Module refers to a self-contained packages of Terraform configurations that are managed as a group. This repo is a Terraform Module and contains many "submodules" which can be composed together to create useful infrastructure patterns.

Who maintains this Module?

This Module is maintained by Gruntwork. If you're looking for help or commercial support, send an email to [email protected]. Gruntwork can help with:

  • Setup, customization, and support for this Terraform Module.
  • Commercially supported Modules for other types of infrastructure, such as VPCs, Docker clusters, databases, and continuous integration.
  • Modules that meet compliance requirements, such as HIPAA.
  • Consulting & Training on AWS, Google Cloud, Terraform, and DevOps.

How do you use this Module?

This Module adheres to Terraform Module Conventions and has the following folder structure:

  • modules: This folder contains the reusable code for this Terraform Module, broken down into one or more submodules.
  • examples: This folder contains examples of how to use the submodules.
  • test: Automated tests for the submodules and examples.

Click on each of the submodules above for more details.

To deploy Vault with this Terraform Module, you will need to deploy two separate clusters: one to run Consul servers (which Vault uses as a high availability backend) and one to run Vault servers.

To deploy the Consul server cluster, use the Consul GCP Module.

To deploy the Vault cluster:

  1. Create a Google Image that has Vault installed (using the install-vault module) and the Consul agent installed (using the install-consul module). Here is an example Packer template. Google Cloud does not allow the creation of public Images so you must create this Image on your own to proceed!

  2. Deploy that Image across a Managed Instance Group using the Terraform vault-cluster-module.

1 TODO ACCESSING THE CLUSTER THROUGH SSH

  1. Execute the run-consul script with the --client flag during boot on each Instance to have the Consul agent connect to the Consul server cluster.

  2. Execute the run-vault script during boot on each Instance to create the Vault cluster.

  3. If you only need to access Vault from inside your GCP account (recommended), run the install-dnsmasq module on each server, and that server will be able to reach Vault using the Consul Server cluster as the DNS resolver (e.g. using an address like vault.service.consul). See the vault-cluster-private example for working sample code.

  4. If you need to access Vault from the public Internet, deploy the vault-lb-fr module and have all requests to Vault go through the Load Balancer. See the vault-cluster-public example for working sample code.

  5. Head over to the How do you use the Vault cluster? guide to learn how to initialize, unseal, and use Vault.

Quick Start

See the root-example for the fastest way to try out this Module.

How do I contribute to this Module?

Contributions are very welcome! Check out the Contribution Guidelines for instructions.

How is this Module versioned?

This Terraform Module follows the principles of Semantic Versioning. You can find each new release, along with the changelog, in the Releases Page.

During initial development, the major version will be 0 (e.g., 0.x.y), which indicates the code does not yet have a stable API. Once we hit 1.0.0, we will make every effort to maintain a backwards compatible API and use the MAJOR, MINOR, and PATCH versions on each release to indicate any incompatibilities.

License

This code is released under the Apache 2.0 License. Please see LICENSE and NOTICE for more details.

Copyright © 2017 Gruntwork, Inc.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].