vault

hashicorp/vault/google

Terraform Module HCL GOOGLE

A Terraform Module for how to run Vault on Google Cloud using Terraform and Packer

Install
module "vault" {
source = "hashicorp/vault/google"
version = "0.2.0"
}
⭐ Source on GitHub 📦 Registry page
README

![Maintained by Gruntwork.io](https://gruntwork.io/?ref=repo_gcp_vault) !Terraform Version Vault for Google Cloud Platform (GCP) This repo contains a Terraform Module for how to deploy a Vault cluster on GCP using Terraform. Vault is an open source tool for managing secrets. This Module uses GCS as a storage backend and a Consul server cluster as a high availability backend: !Vault architecture This Module includes the following submodules: install-vault: This module can be used to install Vault. It can be used in a Packer template to create a Vault Google Image. run-vault: This module can be used to configure and run Vault. It can be used in a Startup Script to fire up Vault while the server is booting. install-nginx: This module can be used to install Nginx. It can be used in a Packer te

Inputs (19)
NameTypeDescriptionDefault
vault_source_imagestringThe Google Image used to launch each node in the Vault Server cluster. You can b required
image_project_idstringThe name of the GCP Project where the image is located. Useful when using a sepa required
gcp_project_idstringThe name of the GCP Project where all resources will be launched. required
gcp_regionstringThe region in which all GCP resources will be launched. required
vault_cluster_namestringThe name of the Vault Server cluster. All resources will be namespaced by this v required
network_project_idstringThe name of the GCP Project where the network is located. Useful when using netw required
consul_server_cluster_namestringThe name of the Consul Server cluster. All resources will be namespaced by this required
consul_server_source_imagestringThe Google Image used to launch each node in the Consul Server cluster. You can required
consul_server_machine_typestringThe machine type of the Compute Instance to run for each node in the Consul Serv"g1-small"
consul_server_cluster_sizenumberThe number of nodes to have in the Consul Server cluster. We strongly recommende3
root_volume_disk_size_gbnumberThe size, in GB, of the root disk volume on each Consul node.30
enable_vault_uiboolIf true, enable the Vault UItrue
gcs_bucket_force_destroyboolIf true, Terraform will delete the Google Cloud Storage Bucket even if it's non-true
vault_cluster_sizenumberThe number of nodes to have in the Vault Server cluster. We strongly recommended3
web_proxy_portnumberThe port at which the HTTP proxy server will listen for incoming HTTP requests t8000
vault_cluster_machine_typestringThe machine type of the Compute Instance to run for each node in the Vault clust"g1-small"
gcs_bucket_locationstringThe location of the Google Cloud Storage Bucket where Vault secrets will be stor"US"
gcs_bucket_classstringThe Storage Class of the Google Cloud Storage Bucket where Vault secrets will be"MULTI_REGIONAL"
root_volume_disk_typestringThe GCE disk type. Can be either pd-ssd, local-ssd, or pd-standard"pd-standard"
Outputs (15)
firewall_rule_allow_inbound_api_url
firewall_rule_allow_inbound_health_check_url
bucket_name_id
gcp_project_id
vault_cluster_size
instance_group_id
instance_template_url
firewall_rule_allow_intracluster_vault_id
firewall_rule_allow_inbound_api_id
firewall_rule_allow_intracluster_vault_url
firewall_rule_allow_inbound_health_check_id
bucket_name_url
cluster_tag_name
instance_group_name
instance_group_url
Details
FrameworkTerraform Module
LanguageHCL
Version0.2.0
Cloud GOOGLE
★ Stars115
Forks73
Total downloads6.9k
Inputs19
Outputs15
Examples5
Submodules3
LicenseApache-2.0
Namespacehashicorp
Updated