Open MikeK184 opened 1 year ago
This line shows a misunderstanding:
tls_client_ca_file = "/vault/userconfig/vault-ha-tls/vault.ca"
You are not using client certificate authentication, so you should not set this. It does not break anything, but it misleads you and others reading the configuration into thinking you have set a relevant setting, when you have not.
VAULT_CACERT: /vault/userconfig/vault-ha-tls/vault.ca
This environment variable is primarily intended for configuring a Vault client, not a server. It has one limited usage in connection with a Vault server - configuring the CA certificate to trust when connecting to another Vault being used as a transit auto-unseal method, but is otherwise unused. Since you are not using transit auto-unseal, you should remove this variable, again to avoid making an implication you are setting a needed setting, which is actually redundant.
VAULT_TLSCERT: /vault/userconfig/vault-ha-tls/vault.crt VAULT_TLSKEY: /vault/userconfig/vault-ha-tls/vault.key
These environment variables are simply incorrect names that appear nowhere in the Vault source code.
What you actually need to be setting, is this: https://developer.hashicorp.com/vault/docs/configuration/storage/raft#leader_ca_cert_file
I appreciate the quick response and the explanations, however... if you have a look here: https://developer.hashicorp.com/vault/tutorials/kubernetes/kubernetes-minikube-tls#deploy-the-vault-cluster-via-helm-with-overrides the two environment variables are set there, I obviously have no idea what fields are actually relevant but one would assume that stuff you find on the official website are valid...
I'll give the link you provided a try though!
one would assume that stuff you find on the official website are valid
If only that were true. In my experience the quality of those tutorials is pretty patchy. And there's not even a way to propose edits to them.
Actually, let me tag @hsimon-hashicorp who may be able to route this feedback somewhere so that it does some good :-)
And subsequently, I'll tag in our Education team - @yhyakuna and @schavis :)
has the documentation been updated? what was the outcome? i'm having exactly the same issue as @MikeK184 had.
@MikeK184 did you manage to get the root cause or fix the CA issue?
I have deployed Vault with HA using Raft with AWS KMS successfully, now I wanted to implement TLS for internal communication however after configuring the Helm chart I receive such errors:
I used the following steps to create the necessary files:
And this is my values-overwrite.yaml file:
I've also tried going according to an offical guide: https://developer.hashicorp.com/vault/tutorials/kubernetes/kubernetes-minikube-tls however I can't even execute
vault operator init
because the container complains that the CA is from an unknown authoritiy straigt up, whereas with my steps, I can unseal the first pod, but the other 2 instances dont get auto unsealed and complain about the tls configuration.