Open cytopia opened 6 years ago
Is this supposed to be HTTPS access to each of the vault clusters? Is it sufficient, if I only allow the Vault ELB as inbound or does each vault cluster also need to talk to the other vault clusters?
If you only want access via the ELB, then set allowed_inbound_cidr_blocks
to an empty list and set allowed_inbound_security_group_ids
to the security group of the ELB.
Is it safe to only specify the CIDR of the consul clusters or do I need external access here?
The Consul agents should be accessible from Vault and Consul. Ad both of their security group IDs to allowed_inbound_security_group_ids
.
What exactly needs to connect to the consul cluster as the safest minimum?
Consul should be accessible from Vault. Add its security group IDs to allowed_inbound_security_group_ids
.
@brikis98 thanks for the reply. I dug a little deeper into this and am in need of some more clarifications. I'm a bit lost at the moment and want to ensure that I give out the least possible privileges. I will put it as simple yes/no so I can make sure I only have what I really need.
8301
(consul agent port?)In your example 8301
is allowing TCP and UDP.
8301
from itself?8301
from other vault instances?8301
from consul instances?8301
from itself?8301
from other vault instances?8301
from consul instances?8201
(Vault HA port?)In your example 8201
is only allowing TCP.
8201
from itself?8201
from other vault instances?8201
from consul instances?8300
(server rpc port)In your example 8300
is only allowing TCP.
8300
from itself?8300
from other consul instances?8300
from vault instances?8301
(lan port)In your example 8301
is allowing TCP and UDP.
8301
from itself?8301
from other consul instances?8301
from vault instances?8301
from itself?8301
from other consul instances?8301
from vault instances?8302
(wan port???)In your example 8302
is allowing TCP and UDP.
As the name says serf_wan_port
, is this actually required for a setup in a single VPC?
8302
from itself?8302
from other consul instances?8302
from vault instances?8302
from itself?8302
from other consul instances?8302
from vault instances?8500
(api port?)In your example 8500
is only allowing TCP.
8500
from itself?8500
from other consul instances?8500
from vault instances?8600
(dns port?)In your example 8600
is allowing TCP and UDP.
8600
from itself?8600
from other consul instances?8600
from vault instances?8600
from itself?8600
from other consul instances?8600
from vault instances?I also see Consul inbound 8400/tcp from vault and 0.0.0.0/0 by the default example, however no vault instance exposes this port, or am I missing something here?
Thanks for your time.
Dear Maintainer,
I have a couple of questions regarding your security group definitions.
My goal is to have least possible access and only access the vault servers via its ELB from anywhere. Apart from that each of the servers (vault and consul) should have very strict rules as there are also other EC2 instances in the same VPC which should NOT be able to access the,.
vault_cluster.allowed_inbound_cidr_blocks
Is this supposed to be HTTPS access to each of the vault clusters? Is it sufficient, if I only allow the Vault ELB as inbound or does each vault cluster also need to talk to the other vault clusters?
security_group_rules.allowed_inbound_cidr_blocks
Is it safe to only specify the CIDR of the consul clusters or do I need external access here?
consul_cluster.allowed_inbound_cidr_blocks
What exactly needs to connect to the consul cluster as the safest minimum?