Skip to content

2023.1: Various fixes & improvements to HCP Vault #1090

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
Jun 21, 2024

Conversation

markgoddard
Copy link
Contributor

See commit messages for details of individual changes.

This brings in a useful idempotency fix for Vault deployment.
@markgoddard markgoddard self-assigned this Jun 6, 2024
markgoddard added a commit to stackhpc/terraform-kayobe-multinode that referenced this pull request Jun 7, 2024
In Antelope SKC since PR 1090 it is possible to deploy and use Vault
without HAProxy. This simplifies the deployment process, and means we
can avoid an initial deployment of HAProxy with TLS disabled.

This change is backward compatible with the previous method.

Depends-On: stackhpc/stackhpc-kayobe-config#1090
markgoddard added a commit to stackhpc/terraform-kayobe-multinode that referenced this pull request Jun 7, 2024
In Antelope SKC since PR 1090 it is possible to deploy and use Vault
without HAProxy. This simplifies the deployment process, and means we
can avoid an initial deployment of HAProxy with TLS disabled.

This change is backward compatible with the previous method.

Needed-By: stackhpc/stackhpc-kayobe-config#1090
markgoddard and others added 4 commits June 7, 2024 09:28
This change modifies the overcloud HashiCorp Vault playbooks to use the
local Vault service rather than via HAProxy. This makes it possible to
deploy and use Vault without HAProxy. This eliminates the previous
bootstrapping issue where HAProxy needed to be deployed without TLS
enabled while generating initial certificates.

To make this work in environments with a proxy configured, https_proxy
is overridden.
In the previous HAProxy config for Vault, 200, 501 and 503 were treated
as healthy. This allowed for bootstrapping Vault via HAProxy, but made
standby backends appear as unhealthy, leading to a Prometheus alert. We
no longer bootstrap Vault via HAProxy, so we can treat 200 (active) and
429 (standby) as healthy.

Co-Authored-By: Dawud Mehmood <[email protected]>
Typically the certificate is only valid for the FQDN. This will not
cause a problem usually because the internal API generally uses the VIP
directly rather than an FQDN.
@markgoddard markgoddard force-pushed the 2023.1-vault-without-haproxy branch from 9f9d404 to 334b663 Compare June 7, 2024 08:29
@markgoddard markgoddard marked this pull request as ready for review June 20, 2024 10:21
@markgoddard markgoddard requested a review from a team as a code owner June 20, 2024 10:21
@markgoddard
Copy link
Contributor Author

This has been tested.

Copy link
Member

@mnasiadka mnasiadka left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

tested in sms lab just now

@mnasiadka mnasiadka merged commit bc83165 into stackhpc/2023.1 Jun 21, 2024
12 checks passed
@mnasiadka mnasiadka deleted the 2023.1-vault-without-haproxy branch June 21, 2024 13:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants