vault-ent-starter

hashicorp/vault-ent-starter/gcp

Terraform Module HCL GCP

A Terraform Module for provisioning an Enterprise Vault cluster (using integrated storage) as described by HashiCorp reference architecture.

Install
module "vault-ent-starter" {
source = "hashicorp/vault-ent-starter/gcp"
version = "0.1.2"
}
plain text: /constructs/tfmod-hashicorp-vault-ent-starter-gcp/install.txt
⭐ Source on GitHub 📦 Registry page
README

Vault Enterprise GCP Module This is a Terraform module for provisioning Vault Enterprise with integrated storage on GCP. This module defaults to setting up a cluster with 5 Vault nodes (as recommended by the Vault with Integrated Storage Reference Architecture). About This Module This module implements the Vault with Integrated Storage Reference Architecture on GCP using the Enterprise version of Vault 1.8+. How to Use This Module - Ensure your GCP credentials are configured correctly and have permission to use the following GCP services: - Cloud Resource Manager API - Compute Engine API - GCP Identity & Access Management (IAM) - GCP Key Management System API - GCP Cloud Storage - Google Cloud Load Balancing - GCP SSL Certificates - Secret Manager API - To deploy without an existing VPC, u

Inputs (24)
NameTypeDescriptionDefault
subnetworkstringThe self link of the subnetwork in which to deploy resources required
user_supplied_kms_crypto_key_self_linkstring(Optional) Self link to user created kms crypto key required
user_supplied_kms_key_ring_self_linkstring(Optional) Self link to user created kms key ring required
project_idstringGCP project in which to launch resources required
resource_name_prefixstringPrefix for naming resources required
user_supplied_userdata_pathstring(Optional) File path to custom userdata script being supplied by the user required
leader_tls_servernamestringOne of the shared DNS SAN used to create the certs used for mTLS required
ssl_certificate_namestringName of the created managed SSL certificate. Required when create_load_balancer required
tls_secret_idstringSecret id/name given to the Google Secret Manager secret required
vault_license_filepathstringFilepath to location of Vault license file required
node_countnumberNumber of Vault nodes to deploy5
vault_license_namestringThe file name for the Vault license file"vault.hclic"
vm_disk_typestringVM Disk type. SSD recommended"pd-ssd"
locationstringLocation of the kms key ring"global"
networking_healthcheck_ipslist(string)Allowed IPs required for healthcheck. Provided by GCP[ "35.191.0.0/16", "130.211.0.0/22"
reserve_subnet_rangestringThe IP address ranges for the https proxy range for the load balancer"10.1.0.0/16"
ssh_source_rangeslist(string)The source IP address ranges from which SSH traffic will be permitted; these ran[ "35.235.240.0/20" ]
vault_lb_health_checkstringThe endpoint to check for Vault's health status"/v1/sys/health?activecode=200\u0026stan
vault_versionstringVault version"1.8.1"
vm_disk_source_imagestringVM Disk source image"projects/ubuntu-os-cloud/global/images/
create_load_balancerboolIf true, creates a private load balancer. Set to false to disable the load balantrue
storage_locationstringThe location of the storage bucket for the Vault license."US"
vm_machine_typestringVM Machine Type"n2-standard-4"
vm_disk_sizenumberVM Disk size500
Outputs (1)
lb_address — Load Balancer Address
Details
FrameworkTerraform Module
LanguageHCL
Version0.1.2
Cloud GCP
★ Stars4
Forks7
Total downloads5.5k
Inputs24
Outputs1
Examples2
Submodules7
LicenseMPL-2.0
Namespacehashicorp
Updated