Displaying 1 to 20 from 48 results

hcl - HCL is the HashiCorp configuration language.

  •    Go

HCL (HashiCorp Configuration Language) is a configuration language built by HashiCorp. The goal of HCL is to build a structured configuration language that is both human and machine friendly for use with command-line tools, but specifically targeted towards DevOps tools, servers, etc.HCL is also fully JSON compatible. That is, JSON can be used as completely valid input to a system expecting HCL. This helps makes systems interoperable with other systems.

hashi-ui - A modern user interface for @hashicorp Consul & Nomad

  •    Javascript

For Nomad, it was quite simple, no mobile-optimized, (somewhat) feature-complete and live-updating interface existed.Today the Consul and Nomad UI exist in the same binary, but do not "cross-talk" to each other, but long term goal is to integrate them even closer, so from Nomad Job UI you can see Consul health check status for the job tasks, and vice versa be able to cross-link between two otherwise distinct systems.

marathon-consul - Integrates Marathon apps with Consul service discovery.

  •    Go

Register Marathon Tasks as Consul Services for service discovery.marathon-consul takes information provided by the Marathon event bus and forwards it to Consul agents. It also re-syncs all the information from Marathon to Consul on startup and repeats it with given interval.

hashi-helper - Disaster Recovery and Configuration Management for Consul and Vault

  •    Go

hashi-helper is a tool meant to enable Disaster Recovery and Configuration Management for Consul and Vault clusters, by exposing configuration via a simple to use and share hcl format.This will create a hashi-helper binary in your $GOPATH/bin directory.

nomad-firehose - Firehose all nomad job, allocation, nodes and evaluations changes to rabbitmq, kinesis or stdout

  •    Go

nomad-firehose is a tool meant to enable teams to quickly build logic around nomad task events without hooking into Nomad API.The project got build artifacts for linux, darwin and windows in the GitHub releases tab.

nomad-helper - Helper command to help ease working with HashiCorp's Nomad scheduler

  •    Go

nomad-helper is a tool meant to enable teams to quickly onboard themselves with nomad, by exposing scaling functionality in a simple to use and share yaml format.The project got build artifacts for linux, darwin and windows in the GitHub releases tab.

vim-hclfmt - Vim plugin for hclfmt

  •    VimL

Vim plugin to format Hashicorp Configuration Language (HCL) files, this format is used by a number of Hashicorp tools, such as Terraform as the language used for configuration.The plugin by default will format *.hcl, *.tf and *.nomad files on save. Under the hood it uses hclfmt to process the files.

vault-auth-slack - A @HashiCorp Vault plugin for authenticating and receiving policies via Slack.

  •    Go

The Vault Auth Slack method is a Vault auth method plugin for authenticating users via Slack. The plugin can run in multiple different "modes" depending on your desired user workflow and risk tolerance. This is both a real custom Vault auth method, and an example of how to build, install, and maintain your own Vault auth plugin.

vault-token-helper-osx-keychain - An example @HashiCorp Vault token helper for Mac OS X Keychain.

  •    Go

This is sample code and a proof-of-concept for creating an external HashiCorp Vault Token Helper. By default, Vault authenticates users locally and caches their token in ~/.vault-token. For shared systems or systems where security is paramount, this may not be ideal. Fortunately, this storage mechanism is an abstraction known as a "token helper".

t-vault - Simplified secrets management solution

  •    Java

T-Vault is built to simplify the process of secrets management. We wanted to build an intuitive and easy to use tool that application developers can easily adopt without sacrificing their agility while still following best practices for secrets management. It uses a few open source products internally including, at its heart Hashicorp Vault. Hashicorp vault provides the core functionality of safely storing secrets at rest and access control to those secrets. T-Vault builds on that base to provide a higher-level of abstraction called Safe. Safes are logical abstractions, internally using the concept of paths within vault. T-Vault simplifies the access management to secrets by hiding away all the complexities of managing polices. A very intuitive web UI provides a nice layer of abstraction and hides all the complexities of managing paths, policies, token management, etc. T-Vault introduces two new personas, a 'Safe User' and 'Safe Administrator'. Safe admins will create Safes and grant access to individuals or a LDAP group or an application. Individuals with access to a Safe can use the web UI or API to do CRUD operations on secrets within their Safe.

ansible-role-packer-debian - Ansible Role - Packer Debian/Ubuntu Configuration for Vagrant VirtualBox


This role configures Debian/Ubuntu (either minimal or full install) in preparation for it to be packaged as part of a .box file for Vagrant/VirtualBox or Vagrant/Vmware_desktop deployment using Packer. You might also want to add another shell provisioner to run cleanup, erasing free space using dd, but this is not required (it will just save a little disk space in the Packer-produced .box file).

ansible-role-packer-rhel - Ansible Role - Packer RHEL/CentOS Configuration for Vagrant VirtualBox


This role configures RHEL/CentOS (either minimal or full install) in preparation for it to be packaged as part of a .box file for Vagrant/VirtualBox deployment using Packer. The role may be made more flexible in the future, so it could work with other Linux flavors and/or other Packer builders besides VirtualBox, but I'm currently only focused on VirtualBox, since the main use case right now is developer VMs.

atlantis-on-gke - A set of @HashiCorp Terraform configurations for running Atlantis on @GoogleCloud GKE

  •    HCL

These Terraform configurations provision an Atlantis cluster on Google Kubernetes Engine using HashiCorp Terraform as the provisioning tool. Google Cloud Storage Backend - Automatically creates a GSC storage bucket for use with Terraform.

cryptr - Cryptr: a GUI for Hashicorp's Vault

  •    HTML

Cryptr is a GUI for Hashicorp's Vault. Using Cryptr, a user may easily interact with their Vault instance's API: reading, creating, and modifying secrets with ease.