Skip to content
Development repository for the hashicorp-vault cookbook
Ruby Shell HTML
Branch: master
Clone or download
PowerSchill and JohnRoesler Miscellaneous Fixes (#170)
* Fixes #166

* Fixes #165

* Fixes #164

* Fixes #163
Latest commit babb838 Oct 12, 2019
Type Name Latest commit message Commit time
Failed to load latest commit information.
.circleci Updates Ubuntu names Sep 23, 2019
.delivery Use our standard delivery local config Sep 16, 2018
attributes Merge from master Aug 14, 2019
documentation Adds sealing Aug 28, 2019
libraries Readds Berksfile Jun 7, 2019
resources Adds mlock support for Debian Sep 23, 2019
spec/recipes Updates Jun 1, 2019
templates Move templates out of the default directory Sep 9, 2018
test Miscellaneous Fixes (#170) Oct 12, 2019
.foodcritic Disable misc foodcritic and cookstyle rules Sep 16, 2018
.gitignore Update gitignore for the new kitchen files Sep 9, 2018
.mdlrc mdl fix Sep 6, 2019
Berksfile Readds Berksfile Jun 7, 2019 Miscellaneous Fixes (#170) Oct 12, 2019
Dangerfile Miscellaneous Fixes (#170) Oct 12, 2019
LICENSE Downlevel commits Aug 18, 2019 Migrate to circleci 2.0 testing May 16, 2019
chefignore Downlevel commits Aug 18, 2019
kitchen.dokken.yml Merge branch 'master' into resource_rewrite May 22, 2019
kitchen.yml tweaks Aug 15, 2019
metadata.rb Miscellaneous Fixes (#170) Oct 12, 2019

hashicorp-vault cookbook

Cookbook Version Build Status OpenCollective OpenCollective License

Application cookbook for installing and configuring Hashicorp Vault.

Platform Support

The following platforms have been certified with integration tests using Test Kitchen:

  • Debian 9
  • CentOS (RHEL) 7
  • Ubuntu 16.04, 18.04

Basic Usage

This cookbook was designed from the ground up to make it dead simple to install and configure the Vault daemon as a system service using Chef. It highlights several of our best practices for developing reusable infrastructure at Bloomberg.

This cookbook provides three sets of node attributes which can be used to fine tune the default recipe which installs and configures Vault. The values from these node attributes are fed directly into the custom resources.

This cookbook can be added to the run list of all of the nodes that you want to be part of the cluster. But the best way to use this is in a wrapper cookbook which sets up a backend, and potentially even TLS certificates. We provide an example Vault Cluster cookbook which uses our Consul cookbook for a highly-available storage solution.


  • Supports a single TLS listener.


This cookbook is maintained by the Sous Chefs. The Sous Chefs are a community of Chef cookbook maintainers working together to maintain important cookbooks. If you’d like to know more please visit or come chat with us on the Chef Community Slack in #sous-chefs.


This project exists thanks to all the people who contribute.


Thank you to all our backers!


Support this project by becoming a sponsor. Your logo will show up here with a link to your website.

You can’t perform that action at this time.