reference deployment

HashiCorp Vault on Amazon EKS

A unified interface to manage and encrypt secrets on Amazon EKS

This Quick Start sets up a flexible, scalable Amazon Web Services (AWS) Cloud environment on Amazon Elastic Kubernetes Service (Amazon EKS), and launches HashiCorp Vault using HashiCorp Vault Helm chart into the configuration of your choice.

HashiCorp Vault lessens the need for static, hardcoded credentials by using trusted identities to centralize passwords and control access. It encrypts sensitive data—both in transit and at rest—using centrally managed and secured encryption keys through a single workflow and API. You can access key-value stores and generate AWS Identity and Access Management (IAM) and AWS Security Token Service (AWS STS) credentials.


This Quick Start was developed by HashiCorp Inc. in partnership with AWS. HashiCorp is an AWS Partner.

  •  What you'll build
  •  How to deploy
  •  Cost and licenses
  •  What you'll build
  • This Quick Start sets up the following HashiCorp Vault environment on AWS. Note that this module is based on the Modular and Scalable Amazon EKS Architecture Quick Start.

    • A highly available architecture that spans three Availability Zones.*
    • A virtual private cloud (VPC) configured with public and private subnets according to AWS best practices, to provide you with your own virtual network on AWS.*
    • In the public subnets:
      • Managed network address translation (NAT) gateways to allow outbound internet access for resources in the private subnets.*
    • In one public subnet:
      • A Linux bastion host in an Auto Scaling group to allow inbound Secure Shell (SSH) access to Amazon Elastic Compute Cloud (Amazon EC2) instances in private subnets. The bastion host is also configured with the Kubernetes kubectl command line interface for managing the Kubernetes cluster.
    • In the private subnets:
      • A group of Kubernetes nodes.
    • An Amazon EKS cluster, which provides the Kubernetes control plane.

    * The template that deploys the Quick Start into an existing VPC skips the components marked by asterisks and prompts you for your existing VPC configuration.

  •  How to deploy
  • To build your HashiCorp Vault cluster on AWS, follow the instructions in the deployment guide. Each deployment takes about 1.5 hours and includes these steps:

    1. If you don't already have an AWS account, sign up at, and sign in to your account.
    2. Launch the Quick Start.
    3. Review audit logs.
    4. Test the deployment.
    5. Get started with HashiCorp EKS Vault.

    Amazon may share user-deployment information with the AWS Partner that collaborated with AWS on the Quick Start.  

  •  Cost and licenses
  • You are responsible for the cost of the AWS services used while running this Quick Start reference deployment. There is no additional cost for using the Quick Start.

    The AWS CloudFormation template for this Quick Start includes configuration parameters that you can customize. Some of these settings, such as instance type, affect the cost of deployment. See the pricing pages for cost estimates of each AWS service you use.

    This Quick Start uses the open-source version of HashiCorp Vault, which does not require a license.