Ansible Vault

用于 Hashicorp Vault 的 Ansible 角色。「🔑 Ansible role for Hashicorp Vault」

Github星跟蹤圖

Ansible role to install Hashicorp Vault

Ansible Lint
Ansible Molecule
Average time to resolve an issue
Percentage of issues still open

This Ansible role performs a basic Vault
installation, including filesystem structure and example configuration.

It can also bootstrap a minimal development or evaluation server or HA
Consul-backed cluster in a Vagrant based environment. See
README_VAGRANT.md and the associated Vagrantfile for more details about the developer mode setup.

Installation

This role resides on GitHub pending the integration with Ansible Galaxy. To install this role create a roles/requirements.yml file in your Ansible project folder with the following contents:

- src: https://github.com/ansible-community/ansible-vault.git
  name: ansible-community.ansible-vault
  scm: git
  version: master

You can use git tag in the version attribute. Also you can honor its legacy name: brianshumate.ansible-vault.

Quick Start Guide

Basic installation is possible using the included site.yml playbook:

ansible-playbook -i hosts site.yml

You can also pass variables in using the --extra-vars option to the
ansible-playbook command:

ansible-playbook -i hosts site.yml --extra-vars "vault_datacenter=maui"

Specify a template file with a different backend definition
(see templates/backend_consul.j2):

ansible-playbook -i hosts site.yml --extra-vars "vault_backend_file=backend_file.j2"

You need to make sure that the template file backend_file.j2 is in the
role directory for this to work.

Requirements

This role requires Archlinux, AmazonLinux, FreeBSD, Debian or a RHEL based Linux distribution. It
might work with other software versions, but does work with the following
specific software and versions. Sorry, there is no planned support at the moment for Windows.

See the molecule scenarios
for currently tested distributions.

Warning

By default, this role may restart vault service when played (when there's a
configuration change, OS Packages installed/updated)

When there's no auto-unseal setup on your cluster, the restart may lead to a
situation where all Vault instances will be sealed and your cluster will be
down.

To avoid this situation, the service restart by the playbook can be disabled
by using the vault_service_restart role variable.

Setting this vault_service_restart to false will disable the vault
service restart by the playbook. You may have to restart the service manually
to load any new configuration deployed.

Role Variables

Misc

Vault Release Scheme

License

BSD-2-Clause

Author Information

Brian Shumate

Contributors

Special thanks to the folks listed in CONTRIBUTORS.md for their
contributions to this project.

主要指標

概覽
名稱與所有者ansible-community/ansible-vault
主編程語言Jinja
編程語言Shell (語言數: 4)
平台
許可證BSD 2-Clause "Simplified" License
所有者活动
創建於2016-10-14 03:42:58
推送於2024-12-15 00:42:01
最后一次提交2024-12-15 11:42:01
發布數146
最新版本名稱v3.0.0 (發布於 2024-12-13 08:42:04)
第一版名稱v1.0.0 (發布於 )
用户参与
星數377
關注者數13
派生數193
提交數628
已啟用問題?
問題數115
打開的問題數32
拉請求數212
打開的拉請求數6
關閉的拉請求數40
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?