Skip to content

Terraform code to perform Vault Benchmarks with performance standbys

Notifications You must be signed in to change notification settings

rejackson73/vault-benchmark-perfstandbys

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Deploy Vault to AWS with Consul Storage Backend

This folder contains a Terraform module for deploying Vault to AWS (within a VPC) along with Consul as the storage backend. It can be used as-is or can be modified to work in your scenario, but should serve as a strong starting point for deploying Vault. It can be used with Ubuntu 16.04 or RHEL 7.5. Terraform version must be <0.12.

The Terraform code will create the following resources in a VPC and subnet that you specify in the AWS us-east-1 region:

  • IAM instance profile, IAM role, IAM policy, and associated IAM policy documents
  • An AWS auto scaling group with 3 EC2 instances running Vault on RHEL 7.5 or Ubuntu 16.04 (depending on the AMI passed to the ami variable)
  • An AWS auto scaling group with 3 EC2 instances running Consul on RHEL 7.5 or Ubuntu 16.04 (depending on the AMI passed to the ami variable)
  • 2 AWS launch configurations
  • 2 AWS Elastic Load Balancers, one for Vault and one for Consul
  • 2 AWS security groups, one for the Vault and Consul EC2 instances and one for the ELBs.
  • Security Group Rules to control ingress and egress for the instances and the ELBs. These attempt to limit most traffic to inside and between the two security groups, but do allow the following broader access: ** inbound SSH access on port 22 from anywhere ** inbound access to the ELBs on ports 8200 for Vault and 8500 for Consul ** outbound calls on port 443 to anywhere (so that the installation scripts can download the vault and consul binaries) After installation, those broader security group rules could be made tighter.

You can deploy this in either a public or a private subnet. But you must set elb_internal and public_ip as instructed below in both cases. The VPC should have at least one subnet with 2 or 3 being preferred for high availability.

Note that the create-iam-and-sgs branch of this repository can be used to create the IAM and security group resources separately. If you do use that, you can then use the asgs-instances-elbs branch to create the auto scaling groups, EC2 instances, and ELBs.

Note that if using the HTTP download links for the evaulation binaries of Vault Enterprise and Consul Enterprise, you will need to apply license files for both of these. See more below. Note, however, that you could use Consul Open Source instead of Consul Enterprise with no loss of functionality. In that case, you would change the consul_download_url to https://releases.hashicorp.com/consul/1.5.0/consul_1.5.0_linux_amd64.zip.

The licenses must be applied within 30 minutes after starting the servers. If you don't do this, you will need to restart them and then apply the licenses within 30 minutes.

Preparation

  1. Download terraform and extract the terraform binary to some directory in your path.
  2. Clone this repository to some directory on your laptop
  3. On a Linux or Mac system, export your AWS keys and AWS default region as variables. On Windows, you would use set instead of export. You can also export AWS_SESSION_TOKEN if you need to use an MFA token to provision resources in AWS.
export AWS_ACCESS_KEY_ID=<your_aws_key>
export AWS_SECRET_ACCESS_KEY=<your_aws_secret_key>
export AWS_DEFAULT_REGION=us-east-1
export AWS_SESSION_TOKEN=<your_token>
  1. Edit the file vault.auto.tfvars and provide values for the variables at the top of the file that do not yet have values.

Be sure to set unzip_command to the appropriate command for Ubuntu or RHEL, depending on your AMI.

Set ami to the ID of a Ubuntu 16.04 or RHEL 7.5 AMI. Public Ubuntu AMIs include ami-759bc50a or ami-059eeca93cf09eebd. A public RHEL 7.5 AMI is ami-6871a115.

Set instance_type to the size you want to use for the EC2 instances.

key_name should be the name of an existing AWS keypair in your AWS account in the us-east-1 region. Use the name as it is shown in the AWS Console, not the name of the private key on your computer. Of course, you'll need that private key file in order to ssh to the Vault instance that is created for you.

vault_name_prefix and consul_name_prefix can be anything you want; they affect the names of some of the resources.

vpc_id should be the id of the VPC into which you want to deploy Vault.

subnets should be the ids of one or more subnets in your AWS VPC in us-east-1. (You can also list multiple subnets and separate them with commas, but you only need one.)

If using a public subnet, use the following for elb_internal and public_ip: elb_internal = false public_ip = true

If using a private subnet, use the following for elb_internal and public_ip: elb_internal = true public_ip = false

Do not add quotes around true and false when setting elb_internal and public_ip.

The owner and ttl variables are intended for use by HashiCorp employees and will be ignored for customers. You can set owner to your name or email.

Deployment

To actually deploy with Terraform, simply run the following two commands:

terraform init
terraform apply

When the second command asks you if you want to proceed, type "yes" to confirm.

You should get outputs at the end of the apply showing something like the following:

Outputs:
consul_address = benchmark-consul-elb-387787750.us-east-1.elb.amazonaws.com
vault_address = benchmark-vault-elb-783003639.us-east-1.elb.amazonaws.com
vault_elb_security_group = sg-09ee1199992b803f7
vault_security_group = sg-0a4c0e2f499e2e0cf

You will be able to use the Vault ELB URL after Vault is initialized which you will do as follows:

  1. In the AWS Console, find and select your Vault instances and pick one.
  2. Click the Connect button for your selected Vault instance to find the command you can use to ssh to the instance.
  3. From a directory containing your private SSH key, run that ssh command.
  4. On the Vault server, run the following commands:
export VAULT_ADDR=http://127.0.0.1:8200
vault operator init -key-shares=1 -key-threshold=1

The init command will show you your root token and unseal key. (In a real production environment, you would specify -key-shares=5 -key-threshold=3.)

export VAULT_TOKEN=<your_root_token>
vault operator unseal

Provide your unseal key when prompted. If you selected a key-threshold greater than 1, repeat the last command until the first Vault instance is unsealed.

  1. If installing evaluation Vault Enterprise and Consul Enterprise binaries, please apply the Vault and Consul license files given to you by HashiCorp.
vault write sys/license text=<contents_of_vault_license_file>
consul license put "<contents_of_consul_license_file>"
  1. To avoid having to export VAULT_ADDR and VAULT_TOKEN in future SSH sessions, edit /home/ubuntu/.profile, /home/ubuntu/.bash_profile, and/or /home/ec2-user/.bash_profile and add the two export commands at the bottom.

Please do the following additional steps for your second and third Vault nodes:

  1. In the AWS Console, find and select your instances and pick the second (or third) one.
  2. Click the Connect button for your EC2 instance in the AWS console to find the command you can use to ssh to the instance.
  3. From a directory containing your private SSH key, run that ssh command.
  4. On the Vault server, run the following commands:
export VAULT_ADDR=http://127.0.0.1:8200
export VAULT_TOKEN=<your_root_token>
vault operator unseal

For the last command, provide your unseal key. If you selected a key-threshold greater than 1, repeat the last command until the Vault instance is unsealed.

Remember to repeat the last set of steps for the third instance.

Your Vault and Consul Servers are now set up and licensed. Additionally, it is running Consul as Vault's storage backend. You can confirm that both Vault and Consul are running with the commands ps -ef | grep vault and ps -ef | grep consul. But if you were able to access the Vault UI, you already know both are running.

Now that you have initialized Vault, you can actually access the Vault UI using your Vault ELB: http://<Vault_ELB_address>:8200/ui.

You can also access your Consul UI through the Consul ELB: http://<Consul_ELB_address>:8500/ui.

Running a Benchmark

This repo is designed to work with the following tools:

More detailed test scripts can be found here: https://github.com/hashicorp/vault-guides/tree/master/operations/benchmarking/wrk-core-vault-operations

Depending on the level of concurrency you use you may need to adjust the ulimit when running wrk/wrk2 on either the benchmark server or your remote machine. Using both of these tools together can provide a holistic assessment of both stress and load capabilities of your cluster.

Below are examples of a valid wrk/wrk2 tests that you could run from the benchmark server. This test is simple and would read a KV entry from Vault. We've given Envoy a static private IP but you could also resolve it with Consul DNS.

10k concurrent connections for 5 minutes for max RPS & 10s timeout & latency stats.
wrk -t4 -c10000 -d300s --latency --timeout 10s --header 'X-VAULT-TOKEN: <token>' 'https://10.0.1.20:8443/v1/secret/foo'

10k concurrent connections for 5 minutes for 5k target RPS & 10s timeout & latency stats.
wrk2 -t4 -R5000 -c10000 -d300s --latency --timeout 10s --header 'X-VAULT-TOKEN: <token>' 'https://10.0.1.20:8443/v1/secret/foo'

About

Terraform code to perform Vault Benchmarks with performance standbys

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages

  • HCL 81.5%
  • Shell 18.5%