2020-08-30 00:25:30 +00:00
|
|
|
datacenter = "{{ main_dc_name }}"
|
|
|
|
data_dir = "/opt/nomad"
|
|
|
|
|
|
|
|
server {
|
|
|
|
enabled = true
|
|
|
|
bootstrap_expect = 1
|
|
|
|
}
|
|
|
|
|
2020-10-13 02:39:23 +00:00
|
|
|
vault {
|
|
|
|
enabled = true
|
|
|
|
ca_file = "/etc/pki/certs/{{ vault_ca_cert_name }}"
|
2022-11-01 20:02:59 +00:00
|
|
|
token = "{{ lookup('hashi_vault', 'secret=kv/data/nomad:data ca_cert=/etc/pki/certs/MaskedName_Root_CA.crt')['vault-token'] }}"
|
2020-10-13 02:39:23 +00:00
|
|
|
address = "https://vault.service.{{ consul_domain }}:8200"
|
|
|
|
create_from_role = "nomad-cluster"
|
|
|
|
unwrap_token = true
|
|
|
|
}
|
|
|
|
|
2020-08-30 00:25:30 +00:00
|
|
|
consul {
|
2022-11-01 20:02:59 +00:00
|
|
|
token = "{{ lookup('hashi_vault', 'secret=kv/data/nomad:data ca_cert=/etc/pki/certs/MaskedName_Root_CA.crt')['consul-acl-server'] }}"
|
2020-08-30 00:25:30 +00:00
|
|
|
}
|
2020-10-01 02:37:18 +00:00
|
|
|
|
|
|
|
tls {
|
|
|
|
http = true
|
|
|
|
rpc = true
|
|
|
|
ca_file = "/etc/pki/certs/{{ vault_ca_cert_name }}"
|
|
|
|
cert_file = "/etc/nomad.d/certs/nomad.pem"
|
|
|
|
key_file = "/etc/nomad.d/certs/nomad.key"
|
|
|
|
}
|