/cerberus-vault-puppet-module

A Puppet module for installing Hashicorp's Vault as a service with customized start up scripts for Cerberus.

Primary LanguageHTMLApache License 2.0Apache-2.0

Cerberus Vault Puppet Module

This module installs Vault for Cerberus and an upstart script. It is used in creating a Cerberus environment.

To learn more about Cerberus, please visit the Cerberus website.

Table of Contents

  1. Module Description - What the module does and why it is useful
  2. Setup - The basics of getting started with vault
  3. Usage - Configuration options and additional functionality
  4. Installed Files - What gets installed

Module Description

Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Vault presents a unified API to access multiple backends: HSMs, AWS IAM, SQL databases, raw key/value, and more.

More Information: (https://vaultproject.io/)

Setup

What vault affects

This module should be run only on a instance that will be dedicated to running vault.

Setup Requirements

This puppet module assumes the base image already has tools like unzip and awscli installed.

Usage

Start vault with upstart as root: start vault Stop vault with upstart as root: stop vault

The process runs as a system user named vault

Installed Files

Upstart Config: /etc/init/vault.conf Binary: /usr/local/bin/* Configuration: /etc/vault/* Log: /var/log/vault/*