Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature: Vault integration for consul TLS / gossip key #2209

Closed
jhmartin opened this issue Jul 25, 2016 · 2 comments
Closed

Feature: Vault integration for consul TLS / gossip key #2209

jhmartin opened this issue Jul 25, 2016 · 2 comments
Labels
theme/consul-vault Relating to Consul & Vault interactions theme/operator-usability Replaces UX. Anything related to making things easier for the practitioner theme/tls Using TLS (Transport Layer Security) or mTLS (mutual TLS) to secure communication type/enhancement Proposed improvement or new feature
Milestone

Comments

@jhmartin
Copy link
Contributor

Consul requires certain encryption keys and CA infrastructure. This would be conveniently stored in a Vault instance, this this feature request is to allow Consul to fetch its gossip key and TLS keys out of Vault.

This does create a chicken/egg when using Consul as a back-end to Vault, so the consul 'servers' would generally need to rely on a different 'non-consul' version of Vault, while the rest of the environment uses a consul-ized vault.

@slackpad slackpad added the type/enhancement Proposed improvement or new feature label Aug 11, 2016
@slackpad slackpad added the theme/operator-usability Replaces UX. Anything related to making things easier for the practitioner label May 25, 2017
@slackpad slackpad added this to the Unplanned milestone Jan 5, 2018
@slackpad slackpad removed the post-0.9 label Jan 5, 2018
@hanshasselberg hanshasselberg added the theme/tls Using TLS (Transport Layer Security) or mTLS (mutual TLS) to secure communication label Oct 22, 2018
@jsosulska jsosulska added the theme/consul-vault Relating to Consul & Vault interactions label Apr 20, 2020
@jhmartin
Copy link
Contributor Author

Noting that the chicken/egg is less likely now as Vault has its own built-in consul leader and storage mechanism.

@david-yu
Copy link
Contributor

david-yu commented Sep 6, 2023

Our recommendation for users on K8s is to use the Vault Secrets Backend: https://developer.hashicorp.com/consul/docs/k8s/deployment-configurations/vault. For VMs, you could also utilize the KV store and PKI to help with TLS (example) and storage of Consul specific credentials. Will go ahead and close, but please file additional feature requests with more details to help us better understand which use cases to consider.

@david-yu david-yu closed this as completed Sep 6, 2023
Dmitry-Eremeev pushed a commit to Dmitry-Eremeev/consul that referenced this issue Oct 16, 2024
To use the feature we need to set the following options in config file:
use_vault = true
vault_address = http://<IP_ADDRESS:<IP_PORT>
vault_role_id = <ROLE_ID>
vault_secret_id = <SECRET_ID>
vault_secret_path = <deployments/unit/dev/user/passwords_yml>
vault_secret_mount_path = <secret_v2>
credential_name_in_vault_secret = <consul_encrypt>

hashicorp#2209
hashicorp#4685
hashicorp#5043
Dmitry-Eremeev added a commit to Dmitry-Eremeev/consul that referenced this issue Nov 13, 2024
To use the feature we need to set the following options in config file:
use_vault = true
vault_address = http://<IP_ADDRESS:<IP_PORT>
vault_role_id = <ROLE_ID>
vault_secret_id = <SECRET_ID>
vault_secret_path = <deployments/unit/dev/user/passwords_yml>
vault_secret_mount_path = <secret_v2>
credential_name_in_vault_secret = <consul_encrypt>

hashicorp#2209
hashicorp#4685
hashicorp#5043
Dmitry-Eremeev added a commit to Dmitry-Eremeev/consul that referenced this issue Nov 13, 2024
To use the feature we need to set the following options in config file:
use_vault = true
vault_address = http://<IP_ADDRESS:<IP_PORT>
vault_role_id = <ROLE_ID>
vault_secret_id = <SECRET_ID>
vault_secret_path = <deployments/unit/dev/user/passwords_yml>
vault_secret_mount_path = <secret_v2>
credential_name_in_vault_secret = <consul_encrypt>

hashicorp#2209
hashicorp#4685
hashicorp#5043
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
theme/consul-vault Relating to Consul & Vault interactions theme/operator-usability Replaces UX. Anything related to making things easier for the practitioner theme/tls Using TLS (Transport Layer Security) or mTLS (mutual TLS) to secure communication type/enhancement Proposed improvement or new feature
Projects
None yet
Development

No branches or pull requests

5 participants