-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: Vault integration for consul TLS / gossip key #2209
Comments
Noting that the chicken/egg is less likely now as Vault has its own built-in consul leader and storage mechanism. |
Our recommendation for users on K8s is to use the Vault Secrets Backend: https://developer.hashicorp.com/consul/docs/k8s/deployment-configurations/vault. For VMs, you could also utilize the KV store and PKI to help with TLS (example) and storage of Consul specific credentials. Will go ahead and close, but please file additional feature requests with more details to help us better understand which use cases to consider. |
To use the feature we need to set the following options in config file: use_vault = true vault_address = http://<IP_ADDRESS:<IP_PORT> vault_role_id = <ROLE_ID> vault_secret_id = <SECRET_ID> vault_secret_path = <deployments/unit/dev/user/passwords_yml> vault_secret_mount_path = <secret_v2> credential_name_in_vault_secret = <consul_encrypt> hashicorp#2209 hashicorp#4685 hashicorp#5043
To use the feature we need to set the following options in config file: use_vault = true vault_address = http://<IP_ADDRESS:<IP_PORT> vault_role_id = <ROLE_ID> vault_secret_id = <SECRET_ID> vault_secret_path = <deployments/unit/dev/user/passwords_yml> vault_secret_mount_path = <secret_v2> credential_name_in_vault_secret = <consul_encrypt> hashicorp#2209 hashicorp#4685 hashicorp#5043
To use the feature we need to set the following options in config file: use_vault = true vault_address = http://<IP_ADDRESS:<IP_PORT> vault_role_id = <ROLE_ID> vault_secret_id = <SECRET_ID> vault_secret_path = <deployments/unit/dev/user/passwords_yml> vault_secret_mount_path = <secret_v2> credential_name_in_vault_secret = <consul_encrypt> hashicorp#2209 hashicorp#4685 hashicorp#5043
Consul requires certain encryption keys and CA infrastructure. This would be conveniently stored in a Vault instance, this this feature request is to allow Consul to fetch its gossip key and TLS keys out of Vault.
This does create a chicken/egg when using Consul as a back-end to Vault, so the consul 'servers' would generally need to rely on a different 'non-consul' version of Vault, while the rest of the environment uses a consul-ized vault.
The text was updated successfully, but these errors were encountered: