Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

helm:bootstrapping Consul clients with custom ACL policies #681

Closed
infa-bsurber opened this issue Jun 3, 2019 · 3 comments
Closed

helm:bootstrapping Consul clients with custom ACL policies #681

infa-bsurber opened this issue Jun 3, 2019 · 3 comments

Comments

@infa-bsurber
Copy link

As a followup to bootstrapACLs.

I'm using this Consul cluster to back my Vault, which requires adding a custom ACL policy to support Vault's needs.

It would be great to be able to supply extraACLPolicies which would then be added to Consul and an ACL token created for each then stored in K8s secrets.

Bonus points if the Consul client can be configured to use these custom ACL policies+tokens.

@adilyse
Copy link
Contributor

adilyse commented Jun 3, 2019

That's a good suggestion. Tagging this as an enhancement that we can take a look at in the future.

@hannahhearth
Copy link

@infa-bsurber The Consul team is looking for more feedback on the Consul Helm Chart. If any of you have 3 minutes, consider filling out our survey.

@t-eckert t-eckert changed the title bootstrapping Consul clients with custom ACL policies helm:bootstrapping Consul clients with custom ACL policies Aug 24, 2021
@t-eckert t-eckert transferred this issue from hashicorp/consul-helm Aug 24, 2021
lawliet89 pushed a commit to lawliet89/consul-k8s that referenced this issue Sep 13, 2021
* update values file to enable health checks by default and add comments, update unit tests accordingly
@david-yu
Copy link
Contributor

Hi there. I just wanted to follow up on this issue since its been a while since this has received attention. We currently do not plan on prioritizing Consul K8s as a storage backend, as Integrated storage is now the recommended storage backend for Vault as described here: https://www.vaultproject.io/docs/configuration/storage#integrated-storage-vs-external-storage.

We will also be moving towards a model where Consul Login via Auth methods will be preferred over ACL tokens as that greatly simplifies how we manage ACL tokens.

I'll close this but wanted to provide more information on where Consul K8s is heading. Thank you for your feedback.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants