-
Notifications
You must be signed in to change notification settings - Fork 136
Consul: Update integrate/vault/k8s for v1.21 and v1.22 #1560
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Vercel Previews Deployed
|
Broken Link CheckerNo broken links found! 🎉 |
boruszak
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This was especially long, so after you implement the suggestions I'm going to need another read-through before I approve.
| </CodeBlockConfig> | ||
|
|
||
| ## Configure Kubernetes authentication roles in Vault | ||
| #### Configure Kubernetes authentication |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| #### Configure Kubernetes authentication | |
| ### Configure Kubernetes authentication |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@krastin is this part of the Setup PKI secrets engine for TLS and service mesh CA header? It does not seem so from the workflow...I think that this should be an H2.
| The repository contains a configuration file for your Helm chart, named `consul-ent-values.yaml`. | ||
|
|
||
| Open the file and modify the configuration to use your `$VAULT_PRIVATE_ADDR`. | ||
| #### Configure Consul Helm chart to use Vault as secrets manager |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| #### Configure Consul Helm chart to use Vault as secrets manager | |
| ### Configure Consul Helm chart to use Vault as secrets manager |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@krastin I think that this also should be an H2 and should be included in the workflow.
| configuration required to complete this tutorial. | ||
|
|
||
| <CodeTabs tabs={[ "HTTPS", "SSH"]}> | ||
| First, enable a key/value v2 secrets engine at the `consul/` path. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we need also Vault existence as a prerequisite.
- **Vault:** you need a running Vault cluster in your network. You can use a [local Vault dev server](/vault/tutorials/get-started/setup#set-up-the-lab) or an existing Vault deployment.
- Configure your terminal to interact with Vault cluster by setting `VAULT_ADDR`, `VAULT_CACERT`, and `VAULT_TOKEN`.
danielehc
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The headers are not easy to follow. I think we should first rearrange the headers using the right depth, so that the right menu shows the workflow steps, and then we can do another review pass to see if the steps are clearly identified and correct.
boruszak
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Keeping this solution simple. Accept and then this PR is ready to merge!
Co-authored-by: Jeff Boruszak <[email protected]>
Daniele's earlier review was addressed and further on Jeff approved, therefore dismissing this one in order to merge
* k8s with vault integration * omit phrase In this example * Apply suggestions from code review Co-authored-by: Jeff Boruszak <[email protected]> * add further changes and propagate to v1.22.x * add note for vault dev mode * fixing links in list of steps * Apply suggestions from code review Co-authored-by: Jeff Boruszak <[email protected]> * apply codereview to other doc version --------- Co-authored-by: Jeff Boruszak <[email protected]>
Description
This PR is part of the Consul tutorials to documentation conversion project.
The tutorial for Vault integration with Consul on K8s became a documentation page.
Links
Jira: CE-918
Deploy preview
Contributor checklists
Review urgency:
Pull request:
Content:
Reviewer checklist