Skip to content
This repository has been archived by the owner on Aug 4, 2020. It is now read-only.

A Puppet module for installing Hashicorp's Vault as a service with customized start up scripts for Cerberus.

License

Notifications You must be signed in to change notification settings

Nike-Inc/cerberus-vault-puppet-module

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cerberus Vault Puppet Module

This module installs Vault for Cerberus and an upstart script. It is used in creating a Cerberus environment.

To learn more about Cerberus, please visit the Cerberus website.

Table of Contents

  1. Module Description - What the module does and why it is useful
  2. Setup - The basics of getting started with vault
  3. Usage - Configuration options and additional functionality
  4. Installed Files - What gets installed

Module Description

Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Vault presents a unified API to access multiple backends: HSMs, AWS IAM, SQL databases, raw key/value, and more.

More Information: (https://vaultproject.io/)

Setup

What vault affects

This module should be run only on a instance that will be dedicated to running vault.

Setup Requirements

This puppet module assumes the base image already has tools like unzip and awscli installed.

Usage

Start vault with upstart as root: start vault Stop vault with upstart as root: stop vault

The process runs as a system user named vault

Installed Files

Upstart Config: /etc/init/vault.conf Binary: /usr/local/bin/* Configuration: /etc/vault/* Log: /var/log/vault/*