All Projects → testdrivenio → vault-consul-kubernetes

testdrivenio / vault-consul-kubernetes

Licence: other
vault + consul on kubernetes

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to vault-consul-kubernetes

hookpick
A tool to manage some operational concepts of Hashicorp Vault
Stars: ✭ 83 (+38.33%)
Mutual labels:  consul, vault, hashicorp
Hashi Up
bootstrap HashiCorp Consul, Nomad, or Vault over SSH < 1 minute
Stars: ✭ 113 (+88.33%)
Mutual labels:  consul, vault, hashicorp
hashicorp-labs
Deploy locally on VM an Hashicorp cluster formed by Vault, Consul and Nomad. Ready for deploying and testing your apps.
Stars: ✭ 32 (-46.67%)
Mutual labels:  consul, vault, hashicorp
vim-hcl
Syntax highlighting for HashiCorp Configuration Language (HCL)
Stars: ✭ 83 (+38.33%)
Mutual labels:  consul, vault, hashicorp
vault-consul-swarm
Deploy Vault and Consul with Docker Swarm
Stars: ✭ 20 (-66.67%)
Mutual labels:  consul, vault, hashicorp
nomad-box
Nomad Box - Simple Terraform-powered setup to Azure of clustered Consul, Nomad and Traefik Load Balancer that runs Docker/GoLang/Java workloads. NOTE: Only suitable in dev environments at the moment until I learn more Terraform, Consul, Nomad, Vault :P
Stars: ✭ 18 (-70%)
Mutual labels:  consul, vault, hashicorp
Vaultron
🤖 Vault clusters Terraformed onto Docker for great fun and learning!
Stars: ✭ 96 (+60%)
Mutual labels:  consul, vault, hashicorp
Hashi Helper
Disaster Recovery and Configuration Management for Consul and Vault
Stars: ✭ 155 (+158.33%)
Mutual labels:  consul, vault, hashicorp
vault-load-testing
Automated load tests for Vault and Consul using the locust.io Python framework
Stars: ✭ 44 (-26.67%)
Mutual labels:  consul, vault, hashicorp
Ansible Vault
🔑 Ansible role for Hashicorp Vault
Stars: ✭ 189 (+215%)
Mutual labels:  consul, vault, hashicorp
Fabio
Consul Load-Balancing made simple
Stars: ✭ 6,834 (+11290%)
Mutual labels:  consul, vault
Consul Template
Template rendering, notifier, and supervisor for @hashicorp Consul and Vault data.
Stars: ✭ 4,371 (+7185%)
Mutual labels:  consul, vault
Ansible Consul
📡 Ansible role for Hashicorp Consul clusters
Stars: ✭ 320 (+433.33%)
Mutual labels:  consul, hashicorp
Consul
Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.
Stars: ✭ 23,723 (+39438.33%)
Mutual labels:  consul, vault
Hashi Ui
A modern user interface for @hashicorp Consul & Nomad
Stars: ✭ 1,119 (+1765%)
Mutual labels:  consul, hashicorp
Docker Vault
Docker Container for Hashicorp's Vault
Stars: ✭ 60 (+0%)
Mutual labels:  consul, vault
Terraform Modules
Reusable Terraform modules
Stars: ✭ 63 (+5%)
Mutual labels:  consul, vault
course-spring-microservices
Code examples built for the purpose of video course: Microservices With Spring Boot And Spring Cloud
Stars: ✭ 74 (+23.33%)
Mutual labels:  consul, vault
Gomplate
A flexible commandline tool for template rendering. Supports lots of local and remote datasources.
Stars: ✭ 1,270 (+2016.67%)
Mutual labels:  consul, vault
Nomad Firehose
Firehose all nomad job, allocation, nodes and evaluations changes to rabbitmq, kinesis or stdout
Stars: ✭ 96 (+60%)
Mutual labels:  consul, hashicorp

Running Vault and Consul on Kubernetes

Want to learn how to build this?

Check out the post.

Want to use this project?

Prerequisites

Install:

  1. Go
  2. CloudFlare's SSL ToolKit (cfssl and cfssljson)
  3. Consul
  4. Vault
  5. Minikube

Minikube

Start the cluster:

$ minikube config set vm-driver hyperkit
$ minikube start
$ minikube dashboard

TLS Certificates

Create a Certificate Authority:

$ cfssl gencert -initca certs/config/ca-csr.json | cfssljson -bare certs/ca

Create the private keys and TLS certificates:

$ cfssl gencert \
    -ca=certs/ca.pem \
    -ca-key=certs/ca-key.pem \
    -config=certs/config/ca-config.json \
    -profile=default \
    certs/config/consul-csr.json | cfssljson -bare certs/consul

$ cfssl gencert \
    -ca=certs/ca.pem \
    -ca-key=certs/ca-key.pem \
    -config=certs/config/ca-config.json \
    -profile=default \
    certs/config/vault-csr.json | cfssljson -bare certs/vault

Vault and Consul

Spin up Vault and Consul on Kubernetes:

$ sh create.sh

Environment Variables

In a new terminal window, navigate to the project directory and set the following environment variables:

$ export VAULT_ADDR=https://127.0.0.1:8200
$ export VAULT_CACERT="certs/ca.pem"

Verify

$ kubectl get pods
$ vault status
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].