This module installs Vault for Cerberus and an upstart script. It is used in creating a Cerberus environment.
To learn more about Cerberus, please visit the Cerberus website.
- Module Description - What the module does and why it is useful
- Setup - The basics of getting started with vault
- Usage - Configuration options and additional functionality
- Installed Files - What gets installed
Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Vault presents a unified API to access multiple backends: HSMs, AWS IAM, SQL databases, raw key/value, and more.
More Information: (https://vaultproject.io/)
This module should be run only on a instance that will be dedicated to running vault.
This puppet module assumes the base image already has tools like unzip and awscli installed.
Start vault with upstart as root: start vault
Stop vault with upstart as root: stop vault
The process runs as a system user named vault
Upstart Config: /etc/init/vault.conf
Binary: /usr/local/bin/*
Configuration: /etc/vault/*
Log: /var/log/vault/*