vault

hashicorp/vault/aws

Terraform Module HCL AWS

A Terraform Module for how to run Vault on AWS using Terraform and Packer

Install
module "vault" {
source = "hashicorp/vault/aws"
version = "0.17.0"
}
plain text: /constructs/tfmod-hashicorp-vault-aws/install.txt
⭐ Source on GitHub 📦 Registry page
README

![Maintained by Gruntwork.io](https://gruntwork.io/?ref=repo_aws_vault) Vault AWS Module This repo contains a set of modules in the modules folder for deploying a Vault cluster on AWS using Terraform. Vault is an open source tool for managing secrets. By default, this Module uses Consul as a storage backend. You can optionally add an S3 backend for durability. !Vault architecture This Module includes: install-vault: This module can be used to install Vault. It can be used in a Packer template to create a Vault Amazon Machine Image (AMI). run-vault: This module can be used to configure and run Vault. It can be used in a User Data script to fire up Vault while the server is booting. vault-cluster: Terraform code to deploy a cluster of Vault servers using an Auto Scaling Group. vault-elb: Con

Inputs (15)
NameTypeDescriptionDefault
ami_idstringThe ID of the AMI to run in the cluster. This should be an AMI built from the Pa required
hosted_zone_domain_namestringThe domain name of the Route 53 Hosted Zone in which to add a DNS entry for Vaul required
vault_domain_namestringThe domain name to use in the DNS A record for the Vault ELB (e.g. vault.example required
ssh_key_namestringThe name of an EC2 Key Pair that can be used to SSH to the EC2 Instances in this required
subnet_tagsmap(string)Tags used to find subnets for vault and consul servers{}
vpc_tagsmap(string)Tags used to find a vpc for building resources in{}
consul_cluster_namestringWhat to name the Consul server cluster and all of its associated resources"consul-example"
vault_cluster_sizenumberThe number of Vault server nodes to deploy. We strongly recommend using 3 or 5.3
vault_instance_typestringThe type of EC2 Instance to run in the Vault ASG"t2.micro"
consul_instance_typestringThe type of EC2 Instance to run in the Consul ASG"t2.nano"
consul_cluster_tag_keystringThe tag the Consul EC2 Instances will look for to automatically discover each ot"consul-servers"
create_dns_entryboolIf set to true, this module will create a Route 53 DNS A record for the ELB in tfalse
vault_cluster_namestringWhat to name the Vault server cluster and all of its associated resources"vault-example"
consul_cluster_sizenumberThe number of Consul server nodes to deploy. We strongly recommend using 3 or 5.3
use_default_vpcboolWhether to use the default VPC - NOT recommended for production! - should more ltrue
Outputs (17)
vault_servers_cluster_tag_value
ssh_key_name
iam_role_id_vault_cluster
aws_region
security_group_id_vault_cluster
asg_name_consul_cluster
launch_config_name_vault_cluster
launch_config_name_consul_cluster
iam_role_arn_consul_cluster
iam_role_id_consul_cluster
vault_fully_qualified_domain_name
vault_elb_dns_name
security_group_id_consul_cluster
vault_servers_cluster_tag_key
vault_cluster_size
asg_name_vault_cluster
iam_role_arn_vault_cluster
Details
FrameworkTerraform Module
LanguageHCL
Version0.17.0
Cloud AWS
★ Stars659
Forks457
Total downloads171.8k
Inputs15
Outputs17
Examples8
Submodules4
LicenseApache-2.0
Namespacehashicorp
Updated