Vault is a secure credentials storage system from Hashicorp.
It stands up a multi-homed Vault with Consul as a storage backend.
This particular BOSH release is a fork maintained by emerald-squad, because it looks like the original has been abandonned.
I have, and I do. But it provides way more option than the typical set up needs. If that works for you and it makes you happy, great. I wanted something simpler and more opinionated.
safe has some built-in support for this particular BOSH
release, by way of a thing called strongbox
. Primarily, the
extra handy safe unseal
and safe seal
commands work only
with this BOSH release.
A sample manifest is available at manifests/safe.yml
; it has
everything you need to run a 2-node Vault on a 5-node Consul cluster
bosh -e your-bosh-director -d safe deploy manifests/safe.yml
Once Vault is running, you can use safe
to initialize it:
$ safe target https://your.vault.ip some-alias -k
$ safe init
Unseal Key #1: G55lL0iDddspbNxthYPh0RtZb7cWENfJqm6ZhL9LrnkH
Unseal Key #2: 7aGZ4af/dfnJBriYhDftcR6u6ck2iRW8VwY2Aooo4sAR
Unseal Key #3: jcTn71H70++Uq9pkdSLNgoUVeq+h/rakHjzdBgBheTJx
Unseal Key #4: 9SsFAO8nC7xGuL1nf+a1dK1+nsnkqJeHiCEeHgYcpP4L
Unseal Key #5: J8hRCkXnWCx00kC8tyCiyKRxfULDhEGHd/fuO5bKuvxI
Initial Root Token: fa6fc1dd-f70b-dbaf-165f-a95500523454
Vault initialized with 5 keys and a key threshold of 3. Please
securely distribute the above keys. When the Vault is re-sealed,
restarted, or stopped, you must provide at least 3 of these keys
to unseal it again.
Vault does not store the master key. Without at least 3 keys,
your Vault will remain permanently sealed.
safe has unsealed the Vault for you, and written a test value
at secret/handshake.
You have been automatically authenticated to the Vault with the
initial root token. Be safe out there!
Note: You will need safe v1.0.0 or higher, since this BOSH
release now ships with Vault 1.0.2, and safe init
from earlier
versions are known to not work.
That's all there is to it!
The consul-client add consul DNS as a handler for BOSH DNS, allowing you to join your currently active node with the special address https://active.vault.service.consul:8200
.
To use it on another deployment, you need to add a consul-client job on the instance_group where you need to access vault and link it with the consul cluster on your safe deployment :
jobs:
- name: consul-client
release: safe
consumes:
cluster:
from: consul-server
deployment: safe
During the drain of vault, an optional operation will run a step-down on the current vault node and allow another node to take leadership. This can reduce the duration of the interruption of service during an upgrade or restart.
To do that, you will need to create a token with a policy that allows this operation. A policy that does exacly that is located in the utils directory.
# Create a policy called step-down
vault policy write step-down utils/step-down-policy.hcl
# Create a token with the step-down policy
vault token create -policy=step-down -period=1h -orphan
Next, you will need to redeploy and add the step-down.yml
ops file, providing the token as a variable by the method of your choice. This will enable the step-down operation and will add a crontab entry to renew the periodc token every 5 minutes.
- Use the BOSH Backup and Restore tool
- Be careful, running the "restore" script will restart Vault, requiring an unseal operation.
- After unsealing the vault for the first time after a restore, the vault will return HTTP 500 errors for about 15 seconds.
If you want to deploy the Vault Service Broker via BOSH, you can add the BOSH ops file to your deploy:
bosh -e your-bosh-director -d safe deploy \
manifests/safe.yml \
-o manifests/ops/broker.yml \
-v cf-api-url="..." \
-v cf-username="..." \
-v cf-password="..." \
-v cf-skip-ssl-validation=no \
-v vault-token="..." \
-v vault-broker-guid="..." \
-v vault-broker-password="..."
The following variables must be specified:
- cf-api-url - The full URL of the Cloud Foundry API.
- cf-username - What username to sign into CF with.
- cf-password - Password to use for authentication to CF.
- cf-skip-ssl-validation - Whether or not to ignore SSL/TLS
certificate validation errors (expiration, subject mismatch,
etc.) You probably want to set this to
no
. - vault-token - A root token for the broker to authenticate.
- vault-broker-guid - Unique ID for the service broker to use in its plan and service metadata. Once the broker has been registered with the CF marketplace, this should not change.
- vault-broker-password - The password to require for communication between CF and the Vault broker.
Once deployed, you can register the Vault service broker with Cloud Foundry, and enable marketplace access to plans, via the register-broker errand:
bosh -e your-bosh-director -d safe run-errand register-broker
Note: since you must supply a Vault token to the broker, you will always have to deploy Vault without the broker component, initialize and unseal, and then re-deploy with the broker enabled. Otherwise, the broker BOSH (monit) jobs will fail to start up properly, and the deployment as a whole will fail.