Update guidance for vault PKI CA provider (#15422)
* Update guidance for vault PKI CA provider * clarify workarounds if already using vault 1.11+ * Update website/content/docs/connect/ca/vault.mdx * Update website/content/docs/k8s/connect/connect-ca-provider.mdx * Update website/content/docs/k8s/deployment-configurations/vault/data-integration/connect-ca.mdx * Apply suggestions from code review Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com> * add suggestion from Matt Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
This commit is contained in:
parent
9f90e80795
commit
3744102232
|
@ -29,6 +29,8 @@ must be met:
|
|||
were introduced in Vault 0.10.3. Prior versions of Vault are not
|
||||
compatible with Connect.
|
||||
|
||||
~> **Note:** Do not use Vault v1.11.0+ as Consul's Connect CA provider — the intermediate CA will become unable to issue the leaf nodes required by service mesh, and by Consul client agents if using auto-encrypt or auto-config and using TLS for agent communication. If you are already using Vault 1.11+ as a Connect CA, refer to this [Knowledge Base article](https://support.hashicorp.com/hc/en-us/articles/11308460105491) for more information about the underlying cause and recommended workaround.
|
||||
|
||||
## Configuration
|
||||
|
||||
The Vault CA is enabled by setting the CA provider to `"vault"` and
|
||||
|
|
|
@ -23,6 +23,9 @@ To configure the Vault service mesh provider, refer to [Vault as the Service Mes
|
|||
|
||||
## Configuring Vault as a Connect CA (Consul K8s 0.37.0 and earlier)
|
||||
|
||||
|
||||
~> **Note:** Do not use Vault v1.11.0+ as Consul's Connect CA provider — the intermediate CA will become unable to issue the leaf nodes required by service mesh, and by Consul client agents if using auto-encrypt or auto-config and using TLS for agent communication. If you are already using Vault 1.11+ as a Connect CA, refer to this [Knowledge Base article](https://support.hashicorp.com/hc/en-us/articles/11308460105491) for more information about the underlying cause and recommended workaround.
|
||||
|
||||
The following instructions are only valid for Consul K8s CLI 0.37.0 and prior. It describes how to configure Vault as the Connect CA. You can configure other providers during initial bootstrap of the cluster by providing the appropriate [`ca_config`] and [`ca_provider`] values for your provider.
|
||||
|
||||
-> **Auto-renewal:** If using Vault as your Connect CA, we strongly recommend Consul 1.8.5 or later, which includes support for token auto-renewal. If the Vault token is [renewable](https://www.vaultproject.io/api-docs/auth/token#renewable), then Consul automatically renews the token periodically. Otherwise, you must [manually rotate](#manually-rotating-vault-tokens) the Vault token before it expires.
|
||||
|
|
|
@ -13,6 +13,8 @@ This topic describes how to configure the Consul Helm chart to use TLS certifica
|
|||
Consul allows using Kubernetes auth methods to configure Connect CA.
|
||||
This allows for automatic token rotation once the renewal is no longer possible.
|
||||
|
||||
~> **Note:** Do not use Vault v1.11.0+ as Consul's Connect CA provider — the intermediate CA will become unable to issue the leaf nodes required by service mesh, and by Consul client agents if using auto-encrypt or auto-config and using TLS for agent communication. If you are already using Vault 1.11+ as a Connect CA, refer to this [Knowledge Base article](https://support.hashicorp.com/hc/en-us/articles/11308460105491) for more information about the underlying cause and recommended workaround.
|
||||
|
||||
## Overview
|
||||
To use Vault as the service mesh certificate provider on Kubernetes, you will complete a modified version of the steps outlined in the [Data Integration](/docs/k8s/deployment-configurations/vault/data-integration) section.
|
||||
|
||||
|
|
Loading…
Reference in New Issue