-
Notifications
You must be signed in to change notification settings - Fork 16.8k
[incubator/vault] make High Availability and TLS work #4968
Conversation
Hi @nazarewk. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: nazarewk Assign the PR to them by writing The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/assign @scottrigby |
This looks pretty good. Until things like this are solved at helm, this is likely the best we can do for Vault itself. helm/helm#3276 (Maybe Vault's secrets engines would help with subsequently installed charts). Edit: There might be an opportunity to use Let's Encrypt here, but that's a polarizing component -- so I get the need for custom cert. |
Part of this is implemented at: PR #4709 |
@sfrique @coreypobrien |
It looks like this is substantially similar to #4709. It looks like the primary additions here are the option to use pod dns instead of pod IP for the cluster_addr and adding arbitrary env vars. Do you think you could add that after #4709 merges? Out of curiousity, what is the benefit of using the pod dns for cluster_addr? It seems like a lot of hoops to go through (e.g. random jq work in an init container) but I'm not sure why. |
@coreypobrien it allows us to issue a wildcard certificate ( I am not sure what is your setup, but in my setup behind Ingress it is necessary for request forwarding. Vault redirects to the common |
@coreypobrien how about i just rebase onto your branch and then we discuss changes? |
193e6c2
to
35208d1
Compare
a8c2f81
to
b31cdee
Compare
closing for a rework |
Builds on top of #4709
What this PR does / why we need it:
We need this PR to make it possible to run High Availability Vault with TLS enabled and request forwarding working (behind LoadBalancer/Ingress).
This PR adds following:
livenessProbe
tohttpGet
always returning200
,readinessProbe
customization map more directly to GET parameters,.Values.vault.env
(setsVAULT_ADDR
tohttp://
by default),Pod
cluster DNS name ascluster_address
(.Values.vault.podDNSAsClusterAddr
) enabling creation of wildcard TLS certificate (*.<namespaces>.pod.cluster.local
) therefore enabling request forwarding instead of redirection in TLS setup,podAnnotations
tovault.annotations
,README.md
,maxSurge
andmaxUnavailable
customization,