-
Notifications
You must be signed in to change notification settings - Fork 532
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow reading secrets from Vault to configure TLS #4446
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I just reviewed the config, so don't take this as a review :)
pkg/mimir/mimir.go
Outdated
@@ -98,6 +99,7 @@ type Config struct { | |||
Target flagext.StringSliceCSV `yaml:"target"` | |||
MultitenancyEnabled bool `yaml:"multitenancy_enabled"` | |||
NoAuthTenant string `yaml:"no_auth_tenant" category:"advanced"` | |||
VaultEnabled bool `yaml:"vault_enabled" category:"experimental"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we move this inside the vault config data structure? We typically have a enabled
config option inside the data struct config you want to enable.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated
db91c3c
to
2157f23
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for addressing my feedback. I've left some more minor comments, but this looks good.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
e349ca4
to
cb421c8
Compare
What this PR does
If the
VaultEnabled
flag is set, creates a Vault client and reads secrets from the Vault to configure TLS for the mimir components listed here. Currently the only supported auth method is via an auth token.dskit
was updated to accept aSecretReader
interface when configuring TLS. These are all the flags where TLS paths can currently be configured (*.tls-cert-path
,*.tls-key-path
,*.tls-ca-path
):-distributor.ha-tracker.etcd.tls-cert-path
-distributor.ring.etcd.tls-cert-path
-distributor.forwarding.grpc-client.tls-cert-path
-querier.store-gateway-client.tls-cert-path
-ingester.client.tls-cert-path
-ingester.ring.etcd.tls-cert-path
-querier.frontend-client.tls-cert-path
-query-frontend.grpc-client-config.tls-cert-path
-query-frontend.results-cache.redis.tls-cert-path
-blocks-storage.bucket-store.index-cache.redis.tls-cert-path
-blocks-storage.bucket-store.chunks-cache.redis.tls-cert-path
-blocks-storage.bucket-store.metadata-cache.redis.tls-cert-path
-compactor.ring.etcd.tls-cert-path
-store-gateway.sharding-ring.etcd.tls-cert-path
-ruler.client.tls-cert-path
-ruler.alertmanager-client.tls-cert-path
-ruler.ring.etcd.tls-cert-path
-ruler.query-frontend.grpc-client-config.tls-cert-path
-alertmanager.sharding-ring.etcd.tls-cert-path
-alertmanager.alertmanager-client.tls-cert-path
-memberlist.tls-cert-path
-query-scheduler.grpc-client-config.tls-cert-path
-query-scheduler.ring.etcd.tls-cert-path
-overrides-exporter.ring.etcd.tls-cert-path
Checklist
CHANGELOG.md
updated - the order of entries should be[CHANGE]
,[FEATURE]
,[ENHANCEMENT]
,[BUGFIX]