-
Notifications
You must be signed in to change notification settings - Fork 465
Vault service isn't registered in consul. UI not available via vault.service.consul #228
Comments
Although I probably shouldn't do it this way, I tested appending the info into the run-vault script, and so far so good, the dig command pulls up an answer, and the web browser does resolve at this address. I'm not sure if more is required to eliminate the https certificate warnings though, I'd like to figure that out.
|
This is probably the same cause as #223. |
IIRC, using Consul as a backend and specifying a |
The service registration docs even say:
So there must be some other issue going on... |
If someone has time to dig into this and figure out what is going on, a PR is very welcome! |
I'm a bit hesitant to make a PR of this approach because I also read somewhere in Hashicorp docs that when we use Consul as a storage backend, that the same cluster should not be used for service discovery due to load then being able to influence vault throughput (I cannot remember where). It's possible then that what I've done above to get it working might not be an optimal workflow, but at least for small scale operations perhaps it is fine? I don''t know, but If it was indeed an acceptable solution I would comment with that warning. |
Yea, I mean a PR that fixes the issue that made service registration stop working... As I wrote above, adding a |
I should add that the vault version I am using to build the AMI's is v1.5.5
|
This may be related to ubuntu 18 only (My vault cluster is using Ubuntu 18). I encountered something here with a client I tried to get going ( hashicorp/terraform-aws-consul#198 ) that made me wonder if its the fact that I see
|
Yes, we're seeing Ubuntu 18 specific issues here with the DNS code. See #223. |
This should've been fixed in #232 and released in https://github.com/hashicorp/terraform-aws-vault/releases/tag/v0.14.2. |
I updated and tested today, but found that a brand new vault cluster (before being initialised), whilst showing consul services and nodes, retrieved nothing via Before I was using: And I tested today: What else could I check to further diagnose the problem?
I should not that updating did allow my infra to function normally with an existing vault configuration (s3 backend). But this problem became evident when testing from scratch. |
It was my mistake, it appears after installing dnsmasq a reboot was required which I never knew about. I added a request to improve the installer to avoid that here (hopefully just some services need to be restarted) - |
I've been having some trouble being able to access the UI via https://vault.service.consul/ui in a private subnet.
I may be wrong, but I believe the examples showing HA and also the Private subnet example do not register the vault service with consul. So unless you are using an ELB, you wont have the vault.service.consul FQDN to utilise the vault UI.
I am very new to Vault, but I'd imagine this would be problematic for others trying to use a redirect for a private cluster, OIDC, or use the dnsmasq scripts.
I tried to search for where this configuration block for the service registration would be specified in the repo, but couldn't find it:
https://www.vaultproject.io/docs/configuration/service-registration/consul
Is this being specified anywhere or should it be by default? Or is there anywhere in the repo that the vault service is getting registered with consul and I'm missing it?
I also opened a thread on hashicorp discuss yesterday before I realised this might be extending to other functions in this repository as well. https://discuss.hashicorp.com/t/why-might-a-consul-client-not-be-able-to-access-vault-ui-at-https-vault-service-consul-ui/17660
Thanks if anyone can provide any clues!
The text was updated successfully, but these errors were encountered: