Application cookbook for installing and configuring Hashicorp Vault.
The following platforms have been certified with integration tests using Test Kitchen:
- Debian 9
- CentOS (RHEL) 7, 8
- Ubuntu 16.04, 18.04
This cookbook was designed from the ground up to make it dead simple to install and configure the Vault daemon as a system service using Chef. It highlights several of our best practices for developing reusable infrastructure at Bloomberg.
This cookbook provides three sets of node attributes which can be used to fine tune the default recipe which installs and configures Vault. The values from these node attributes are fed directly into the custom resources.
This cookbook can be added to the run list of all of the nodes that you want to be part of the cluster. But the best way to use this is in a wrapper cookbook which sets up a backend, and potentially even TLS certificates. We provide an example Vault Cluster cookbook which uses our Consul cookbook for a highly-available storage solution.
- Supports a single TLS listener.
This cookbook is maintained by the Sous Chefs. The Sous Chefs are a community of Chef cookbook maintainers working together to maintain important cookbooks. If you’d like to know more please visit sous-chefs.org or come chat with us on the Chef Community Slack in #sous-chefs.
This project exists thanks to all the people who contribute.
Thank you to all our backers!
Support this project by becoming a sponsor. Your logo will show up here with a link to your website.