Skip to content

A Terraform module for provisioning and installing Vault Enterprise on Google Compute Engine as described in HashiCorp Validated Designs

License

Notifications You must be signed in to change notification settings

hashicorp/terraform-google-vault-enterprise-hvd

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

33 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Vault Enterprise HVD on GCP GCE

Terraform module aligned with HashiCorp Validated Designs (HVD) to deploy Vault Enterprise on Google Cloud Platform (GCP) using Compute Engine instances. This module deploys Vault Enterprise with integrated storage.

HVD Vault Architecture diagram

Prerequisites

This module requires the following to already be in place in GCP:

Authentication to GCP

It is recommended to authenticate to GCP via the Google Cloud SDK tool. If running Terraform non-interactively, you can use a Google Cloud Service Account.

With the Google Cloud SDK

With the SDK installed locally, authenticate to GCP by running gcloud auth application-default login. You can then set the project for the module by setting the GOOGLE_PROJECT environment variable.

With a Service Account

Create a dedicated GCP service account in the target project and download the key file. You can then set the GOOGLE_APPLICATION_CREDENTIALS environment variable to be used by Terraform along with the GOOGLE_PROJECT variable to set the appropriate project.

Deployment

Upon first deployment, Vault servers will auto-join and form a fresh cluster. The cluster will be in an uninitialized, sealed state. An operator must then connect to the cluster to initialize Vault. If using Shamir seal, the operator must manually unseal each node. If auto-unseal is used via Google KMS, the Vault nodes will automatically unseal upon initialization.

Examples

Example deployment scenarios can be found in the examples directory of this repo here. These examples cover multiple capabilities of the module and are meant to serve as a starting point for operators.

Deployment Options

This module by default deploys on ubuntu-os-cloud this can be changed by updating the following;

  • var.compute_image_family
  • var.compute_image_project

or by creating packer image and providing the var.packer_image see the Packer for additional detail.

TLS

There is a helper doc for tls cert generation should you need it TLS.

Load Balancing

This module supports the deployment of Google's TCP Layer 4 load balancer to sit in front of the Vault cluster. The load balancer can be external (public IP) or internal (private IP) and is configured to use Vault's sys/health API endpoint to determine health status of Vault to ensure clients are always directed to a healthy instance when possible.

The variable load_balancing_scheme is used to dictate the type of load balancer that should be used and can be set as one of the following values:

  • INTERNAL - Load balancer should receive an IP address on a private subnet
  • EXTERNAL - Load balancer should receive a public IP address
  • NONE - No load balancer should be provisioned

KMS

This module supports both the Shamir and Auto Unseal (via Google Cloud KMS) seal mechanism. By default, the module will assume the Shamir method should be used. In the event Auto Unseal should be used, set the variable vault_seal_type to gcp_kms and set the following two additional variables:

  • gcp_kms_key_ring - The name of the cryptographic key ring to use
  • gcp_kms_crypto_key - The name of the cryptographic key to use

See KMS docs for helper material on producing the required KMS inputs.

Terraform configuration

Terraform Module Test

Requirements

Name Version
google ~> 5.33

Providers

Name Version
google ~> 5.33

Resources

Name Type
google_compute_firewall.allow_https resource
google_compute_firewall.allow_iap resource
google_compute_firewall.allow_vault_health_checks resource
google_compute_forwarding_rule.vault_fr resource
google_compute_health_check.vault_auto_healing resource
google_compute_instance_template.vault resource
google_compute_region_backend_service.vault_bs resource
google_compute_region_health_check.vault_hc resource
google_compute_region_instance_group_manager.vault resource
google_dns_record_set.vault resource
google_kms_crypto_key_iam_member.vault_key resource
google_project_iam_custom_role.vault_custom_role resource
google_project_iam_custom_role.vault_kms_custom_role resource
google_project_iam_member.vault_custom_role resource
google_project_iam_member.vault_iam resource
google_project_iam_member.vault_iam_kms resource
google_service_account.vault_sa resource
google_storage_bucket_iam_binding.snapshots_creator resource
google_storage_bucket_iam_binding.snapshots_viewer resource
google_client_config.current data source
google_compute_network.network data source
google_compute_subnetwork.subnetwork data source
google_compute_zones.available data source
google_dns_managed_zone.vault data source
google_kms_crypto_key.vault_key data source
google_kms_key_ring.vault data source
google_netblock_ip_ranges.legacy data source
google_netblock_ip_ranges.new data source

Inputs

Name Description Type Default Required
project_id (required) The project ID to host the cluster in (required) string n/a yes
vault_fqdn Fully qualified domain name to use for joining peer nodes and optionally DNS string n/a yes
vault_license_sm_secret_name Name of Secret Manager secret containing Vault license. string n/a yes
vault_snapshot_gcs_bucket_name Name of Google Cloud Storage bucket to hold Vault snapshots string n/a yes
vault_tls_ca_bundle_sm_secret_name Name of Secret Manager containing Vault TLS custom CA bundle. string n/a yes
vault_tls_cert_sm_secret_name Name of Secret Manager containing Vault TLS certificate. string n/a yes
vault_tls_privkey_sm_secret_name Name of Secret Manager containing Vault TLS private key. string n/a yes
additional_package_names List of additional repository package names to install set(string) [] no
application_prefix (optional) The prefix to give to cloud entities string "vault" no
auto_join_tag (optional) A list of a tag which will be used by Vault to join other nodes to the cluster. If left blank, the module will use the first entry in tags list(string) null no
boot_disk_size (optional) The disk size (GB) to use to create the boot disk number 30 no
boot_disk_type (optional) The disk type to use to create the boot disk string "pd-balanced" no
cidr_ingress_https_allow CIDR ranges to allow HTTPS traffic inbound to Vault instance(s). list(string)
[
"0.0.0.0/0"
]
no
cloud_dns_managed_zone Zone name to create TFE Cloud DNS record in if create_cloud_dns_record is set to true. string null no
common_labels (optional) Common labels to apply to GCP resources. map(string) {} no
compute_image_family (optional) The family name of the image, https://cloud.google.com/compute/docs/images/os-details,defaults to Ubuntu string "ubuntu-2204-lts" no
compute_image_project (optional) The project name of the image, https://cloud.google.com/compute/docs/images/os-details, defaults to Ubuntu string "ubuntu-os-cloud" no
create_cloud_dns_record Boolean to create Google Cloud DNS record for vault_fqdn resolving to load balancer IP. cloud_dns_managed_zone is required when true. bool false no
enable_auto_healing (optional) Enable auto-healing on the Instance Group bool false no
enable_iap (Optional bool) Enable https://cloud.google.com/iap/docs/using-tcp-forwarding#console, defaults to true. bool true no
gcp_kms_crypto_key (optional) The name of the KMS crypto key string null no
gcp_kms_key_ring (optional) The name of the KMS key ring if it exists string null no
gcp_kms_project (optional) The project the KMS key ring is in. Can be left blank if project is the same as provider string null no
gcp_kms_region (optional) The region the KMS key ring is in. Can be left blank if region is the same as main region string null no
google_service_account_iam_roles (optional) List of IAM roles to give to the Vault service account list(string)
[
"roles/secretmanager.secretAccessor",
"roles/logging.logWriter",
"roles/monitoring.metricWriter"
]
no
health_check_interval (optional) How often, in seconds, to send a health check number 30 no
health_timeout (optional) How long, in seconds, to wait before claiming failure number 15 no
initial_auto_healing_delay (optional) The time, in seconds, that the managed instance group waits before it applies autohealing policies number 1200 no
load_balancing_scheme (optional) Type of load balancer to use (INTERNAL, EXTERNAL, or NONE) string "INTERNAL" no
machine_type (optional) The machine type to use for the Vault nodes string "n2-standard-2" no
metadata (optional) Metadata to add to the Compute Instance template map(string) null no
network (optional) The VPC network to host the cluster in string "default" no
network_project_id (optional) The project that the VPC network lives in. Can be left blank if network is in the same project as provider string null no
network_region (optional) The region that the VPC network lives in. Can be left blank if network is in the same region as provider string null no
node_count (optional) The number of nodes to create in the pool number 6 no
packer_image (optional) The packer image to use string null no
region (optional) The region to host the cluster in string "us-central1" no
subnetwork (optional) The subnet in the VPC network to host the cluster in string "default" no
systemd_dir Path to systemd directory for unit files string "/lib/systemd/system" no
tags (optional) A list containing tags to assign to all resources list(string)
[
"vault"
]
no
vault_audit_disk_size (optional) The disk size (GB) to use to create the Vault audit log disk number 50 no
vault_audit_disk_type (optional) The disk type to use to create the Vault audit log disk string "pd-balanced" no
vault_custom_role (optional) List of permissions for the Vault custom role list(string)
[
"compute.zones.list",
"compute.instances.list"
]
no
vault_data_disk_size (optional) The disk size (GB) to use to create the Vault data disk number 100 no
vault_data_disk_type (optional) The disk type to use to create the Vault data disk string "pd-ssd" no
vault_default_lease_ttl_duration The default lease TTL expressed as a time duration in hours, minutes and/or seconds (e.g. 4h30m10s) string "1h" no
vault_dir_bin Path to install Vault Enterprise binary string "/usr/bin" no
vault_dir_config Path to install Vault Enterprise binary string "/etc/vault.d" no
vault_dir_home Path to hold data, plugins and license directories string "/opt/vault" no
vault_dir_logs Path to hold Vault file audit device logs string "/var/log/vault" no
vault_disable_mlock (optional) Disable the server from executing the mlock syscall bool true no
vault_enable_ui (optional) Enable the Vault UI bool true no
vault_group_name Name of group to own Vault files and processes string "vault" no
vault_health_endpoints (optional) The status codes to return when querying Vault's sys/health endpoint map(string)
{
"activecode": "200",
"drsecondarycode": "472",
"performancestandbycode": "473",
"perfstandbyok": "true",
"sealedcode": "503",
"standbycode": "429",
"standbyok": "true",
"uninitcode": "200"
}
no
vault_kms_custom_role (optional) List of permissions for the Vault KMS custom role list(string)
[
"cloudkms.cryptoKeys.get",
"cloudkms.cryptoKeyVersions.useToDecrypt",
"cloudkms.cryptoKeyVersions.useToEncrypt"
]
no
vault_max_lease_ttl_duration The max lease TTL expressed as a time duration in hours, minutes and/or seconds (e.g. 4h30m10s) string "768h" no
vault_plugin_urls (optional list) List of Vault plugin fully qualified URLs (example ["https://releases.hashicorp.com/terraform-provider-oraclepaas/1.5.3/terraform-provider-oraclepaas_1.5.3_linux_amd64.zip"] for deployment to Vault plugins directory) list(string) [] no
vault_port_api TCP port for Vault API listener number 8200 no
vault_port_cluster TCP port for Vault cluster address number 8201 no
vault_seal_type (optional) The seal type to use for Vault string "gcpckms" no
vault_telemetry_config Enable telemetry for Vault map(string) null no
vault_tls_disable_client_certs Disable client authentication for the Vault listener. Must be enabled when tls auth method is used. bool true no
vault_tls_require_and_verify_client_cert (optional) Require a client to present a client certificate that validates against system CAs bool false no
vault_user_data_template (optional) Alternative template file to provide for instance template metadata script. place the file in your local ./templates folder no path required string "google_vault_metadata.sh.tpl" no
vault_user_name Name of system user to own Vault files and processes string "vault" no
vault_version (optional) The version of Vault to use string "1.17.3+ent" no

Outputs

Name Description
loadbalancer_ip The external ip address of the forwarding rule.
vault_cli_config Environment variables to configure the Vault CLI
zones n/a

About

A Terraform module for provisioning and installing Vault Enterprise on Google Compute Engine as described in HashiCorp Validated Designs

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published