Skip to content
This repository has been archived by the owner on Jan 25, 2023. It is now read-only.

enable auto join for consul clients #198

Closed

Conversation

Lucretius
Copy link

Consul seems to be the standard backend for this vault module, but cloud auto join is not supported currently because the IAM policies attached to the vault ec2 roles do not include the required permissions. I've just copied these from the terraform-aws-consul module, though Consul itself claims it only needs the ec2:DescribeInstances permission set.

Tested as follows: Currently using this PR branch in place of the current master module in my own project, and cloud auto_join is working as expected.

@hashicorp-cla
Copy link

hashicorp-cla commented May 19, 2020

CLA assistant check
All committers have signed the CLA.

@brikis98
Copy link
Collaborator

Thanks for the PR! I'm super booked this week, but will try to take a look in the next few days.

Copy link
Collaborator

@brikis98 brikis98 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We add the IAM policies from Consul as follows: https://github.com/hashicorp/terraform-aws-vault/blob/master/main.tf#L92-L96. Since this is Consul-specific, it seems to me that it makes more sense to do it that way?

@Lucretius
Copy link
Author

Ah, actually thats what I was attempting to add, did not notice it was already in that other module. I'll close this PR thanks.

@Lucretius Lucretius closed this May 28, 2020
@Lucretius Lucretius deleted the configure_consul_auto_join branch May 28, 2020 22:04
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants