Migrate to raft vault backend, rm consul
This commit is contained in:
parent
ea0f5ddf3a
commit
2228e66b7d
31 changed files with 24 additions and 515 deletions
|
@ -6,10 +6,6 @@ admin_email_address: amarpreet@minhas.io
|
|||
# hashicorp defaults
|
||||
hashi_arch: amd64
|
||||
|
||||
# consul
|
||||
consul_version: 1.12.2
|
||||
consul_domain: masked.name
|
||||
|
||||
# vault
|
||||
vault_version: 1.10.4
|
||||
vault_pki_policy: masked-dot-name
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
---
|
||||
hashi_arch: arm
|
||||
consul_arch: arm64
|
||||
k3s_role: 'client'
|
||||
k3s_server_hostname: hardtack1.minhas.io
|
||||
|
|
|
@ -1,6 +1,5 @@
|
|||
---
|
||||
hashi_arch: arm
|
||||
consul_arch: arm64
|
||||
k3s_version: v1.24.8+k3s1
|
||||
k3s_role: 'client'
|
||||
k3s_server_hostname: teapot01.minhas.io
|
||||
|
|
|
@ -1,6 +1,5 @@
|
|||
---
|
||||
hashi_arch: arm
|
||||
consul_arch: arm
|
||||
lnd_arch: armv7
|
||||
|
||||
bitcoind_disk: /dev/sda1
|
||||
|
|
|
@ -1,6 +1,5 @@
|
|||
---
|
||||
hashi_arch: arm
|
||||
consul_arch: arm
|
||||
lnd_arch: armv7
|
||||
|
||||
bitcoind_disk: /dev/sda1
|
||||
|
|
|
@ -6,11 +6,6 @@ sedan.minhas.io
|
|||
fishbowl.minhas.io
|
||||
teapot[01:06].minhas.io
|
||||
|
||||
[consul_server]
|
||||
sedan.minhas.io
|
||||
ranger.minhas.io
|
||||
hardtack1.minhas.io
|
||||
|
||||
[hardtack]
|
||||
hardtack[1:7].minhas.io
|
||||
|
||||
|
@ -30,6 +25,7 @@ sedan.minhas.io
|
|||
[vault_server]
|
||||
ranger.minhas.io
|
||||
sedan.minhas.io
|
||||
hardtack1.minhas.io
|
||||
|
||||
[wekan]
|
||||
sedan.minhas.io
|
||||
|
|
|
@ -1,7 +0,0 @@
|
|||
---
|
||||
- hosts: all
|
||||
roles:
|
||||
- { role: consul,
|
||||
when: '"consul_server" not in group_names'
|
||||
}
|
||||
...
|
|
@ -1,6 +0,0 @@
|
|||
---
|
||||
- hosts: consul_server
|
||||
serial: 1
|
||||
roles:
|
||||
- role: consul_server
|
||||
...
|
|
@ -1,8 +1,6 @@
|
|||
---
|
||||
- import_playbook: common.yml
|
||||
- import_playbook: consul-server.yml
|
||||
- import_playbook: vault-server.yml
|
||||
- import_playbook: consul-client.yml
|
||||
- import_playbook: k3s.yml
|
||||
- import_playbook: docker-repo.yml
|
||||
- import_playbook: lnd.yml
|
||||
|
|
|
@ -68,7 +68,7 @@
|
|||
register: exp
|
||||
|
||||
- name: get cert
|
||||
shell: "vault write pki_int/issue/{{ vault_pki_policy }} common_name={{ inventory_hostname_short }}.{{ main_dc_name }}.{{ consul_domain }} ttl=43200m"
|
||||
shell: "vault write pki_int/issue/{{ vault_pki_policy }} common_name={{ inventory_hostname_short }}.masked.name ttl=43200m"
|
||||
args:
|
||||
executable: /bin/bash
|
||||
environment:
|
||||
|
|
|
@ -1,4 +0,0 @@
|
|||
---
|
||||
consul_config_path: /etc/consul.d
|
||||
consul_arch: '{{ hashi_arch }}'
|
||||
...
|
|
@ -1,18 +0,0 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIC6jCCApGgAwIBAgIQME5Go459u5LlhDqirL54aTAKBggqhkjOPQQDAjCBuDEL
|
||||
MAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNpc2Nv
|
||||
MRowGAYDVQQJExExMDEgU2Vjb25kIFN0cmVldDEOMAwGA1UEERMFOTQxMDUxFzAV
|
||||
BgNVBAoTDkhhc2hpQ29ycCBJbmMuMT8wPQYDVQQDEzZDb25zdWwgQWdlbnQgQ0Eg
|
||||
NjQyMDkzNzU2Nzk2MDMyOTY4MTA4MDI5ODk2NTUzNjQ4OTI3NzcwHhcNMjAwODI3
|
||||
MTYxOTE4WhcNMjUwODI2MTYxOTE4WjCBuDELMAkGA1UEBhMCVVMxCzAJBgNVBAgT
|
||||
AkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNpc2NvMRowGAYDVQQJExExMDEgU2Vjb25k
|
||||
IFN0cmVldDEOMAwGA1UEERMFOTQxMDUxFzAVBgNVBAoTDkhhc2hpQ29ycCBJbmMu
|
||||
MT8wPQYDVQQDEzZDb25zdWwgQWdlbnQgQ0EgNjQyMDkzNzU2Nzk2MDMyOTY4MTA4
|
||||
MDI5ODk2NTUzNjQ4OTI3NzcwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASUDPnD
|
||||
lfeWaTrJHZ9JzovcEXTGh2VKOaq4a1GceAqYNg1Jj2A6+6Je9Nm5+tvVn939ZS0z
|
||||
NQGjuL3vdxJN96sYo3sweTAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB
|
||||
/zApBgNVHQ4EIgQg7s5SJjjgtyy/XUHwQk43iXapCXQIIFqOivTddv6RGacwKwYD
|
||||
VR0jBCQwIoAg7s5SJjjgtyy/XUHwQk43iXapCXQIIFqOivTddv6RGacwCgYIKoZI
|
||||
zj0EAwIDRwAwRAIgGj3Z1yyMTcdsZiFu89Si0E9ueX2CAAztWabhbvzMOl4CIHIv
|
||||
DhH1LG5/DHuJCQA4MAKLiDzt1/XQoS1FJiguyorb
|
||||
-----END CERTIFICATE-----
|
|
@ -1,17 +0,0 @@
|
|||
[Unit]
|
||||
Description=Consul Service Discovery Agent
|
||||
After=network-online.target
|
||||
|
||||
[Service]
|
||||
Type=simple
|
||||
Restart=on-failure
|
||||
User=consul
|
||||
Group=consul
|
||||
RestartSec=3
|
||||
StateDirectory=consul
|
||||
ExecStart=/usr/local/bin/consul agent -config-dir /etc/consul.d/
|
||||
ExecReload=/bin/kill -HUP $MAINPID
|
||||
KillSignal=SIGINT
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
|
@ -1,19 +0,0 @@
|
|||
---
|
||||
- name: daemon_reload
|
||||
systemd:
|
||||
daemon_reload: True
|
||||
|
||||
- name: restart_consul_debian
|
||||
systemd:
|
||||
name: consul
|
||||
state: restarted
|
||||
|
||||
- name: restart_consul_fbsd
|
||||
service:
|
||||
name: consul
|
||||
state: restarted
|
||||
|
||||
- name: reload consul
|
||||
service:
|
||||
name: consul
|
||||
state: reloaded
|
|
@ -1,90 +0,0 @@
|
|||
---
|
||||
- name: ensure consul group
|
||||
group:
|
||||
name: consul
|
||||
state: present
|
||||
system: True
|
||||
|
||||
- name: ensure consul user
|
||||
user:
|
||||
name: consul
|
||||
state: present
|
||||
group: consul
|
||||
system: True
|
||||
|
||||
- name: ensure consul config dir
|
||||
file:
|
||||
path: /etc/consul.d/
|
||||
state: directory
|
||||
owner: consul
|
||||
group: consul
|
||||
mode: 0755
|
||||
|
||||
- name: ensure consul config dir
|
||||
file:
|
||||
path: /etc/consul.d/certs/
|
||||
state: directory
|
||||
owner: consul
|
||||
group: consul
|
||||
mode: 0744
|
||||
|
||||
- name: ensure consul agent ca cert
|
||||
copy:
|
||||
src: files/consul-agent-ca.pem
|
||||
dest: /etc/consul.d/certs/consul-agent-ca.pem
|
||||
owner: consul
|
||||
group: consul
|
||||
mode: 0644
|
||||
|
||||
- name: ensure consul data dir
|
||||
file:
|
||||
path: /opt/consul
|
||||
state: directory
|
||||
owner: consul
|
||||
group: consul
|
||||
mode: 0755
|
||||
|
||||
- name: check consul version
|
||||
shell:
|
||||
cmd: "consul --version | head -1 | cut -d'v' -f2"
|
||||
args:
|
||||
executable: /bin/bash
|
||||
changed_when: False
|
||||
register: installed_consul_version
|
||||
check_mode: False
|
||||
|
||||
- name: get consul
|
||||
unarchive:
|
||||
src: "https://releases.hashicorp.com/consul/{{ consul_version }}/consul_{{ consul_version }}_linux_{{ consul_arch }}.zip"
|
||||
dest: /usr/local/bin/
|
||||
mode: 0755
|
||||
owner: root
|
||||
group: root
|
||||
remote_src: True
|
||||
when: installed_consul_version.stdout != consul_version
|
||||
notify: reload consul
|
||||
|
||||
- name: copy consul unit file
|
||||
copy:
|
||||
src: files/consul.service
|
||||
dest: /etc/systemd/system/consul.service
|
||||
mode: 0755
|
||||
owner: root
|
||||
group: root
|
||||
notify: daemon_reload
|
||||
|
||||
- name: template consul config
|
||||
template:
|
||||
src: templates/consul.hcl.j2
|
||||
dest: /etc/consul.d/consul.hcl
|
||||
owner: consul
|
||||
group: consul
|
||||
mode: 0750
|
||||
notify: restart_consul_debian
|
||||
|
||||
- name: ensure consul is started and enabled
|
||||
systemd:
|
||||
name: consul
|
||||
state: started
|
||||
enabled: True
|
||||
...
|
|
@ -1,3 +0,0 @@
|
|||
---
|
||||
- include_tasks: "{{ ansible_os_family }}.yml"
|
||||
...
|
|
@ -1,37 +0,0 @@
|
|||
datacenter = "{{ main_dc_name }}"
|
||||
primary_datacenter = "{{ main_dc_name }}"
|
||||
domain = "{{ consul_domain }}"
|
||||
node_name = "{{ inventory_hostname_short }}"
|
||||
|
||||
encrypt = "{{ lookup('hashi_vault', 'secret=kv/data/consul:gossip ca_cert=/etc/pki/certs/MaskedName_Root_CA.crt') }}"
|
||||
|
||||
verify_incoming = false
|
||||
verify_outgoing = true
|
||||
verify_server_hostname = true
|
||||
ca_file = "/etc/pki/certs/{{ vault_ca_cert_name }}"
|
||||
|
||||
auto_encrypt {
|
||||
tls = true
|
||||
}
|
||||
|
||||
bind_addr = "{{ ansible_default_ipv4.address }}"
|
||||
start_join = ["{{ groups['consul_server'] | map('extract', hostvars, ['ansible_default_ipv4', 'address']) | join('","') }}"]
|
||||
|
||||
data_dir = "/opt/consul"
|
||||
log_level = "INFO"
|
||||
raft_protocol = 3
|
||||
|
||||
addresses {
|
||||
http = "0.0.0.0"
|
||||
}
|
||||
|
||||
enable_local_script_checks = true
|
||||
|
||||
acl {
|
||||
enabled = true
|
||||
default_policy = "deny"
|
||||
enable_token_persistence = true
|
||||
tokens {
|
||||
default = "{{ lookup('hashi_vault', 'secret=kv/data/consul:server-acl-token ca_cert=/etc/pki/certs/MaskedName_Root_CA.crt') }}"
|
||||
}
|
||||
}
|
|
@ -1,3 +0,0 @@
|
|||
---
|
||||
consul_config_path: /etc/consul.d
|
||||
...
|
|
@ -1,18 +0,0 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIC6jCCApGgAwIBAgIQME5Go459u5LlhDqirL54aTAKBggqhkjOPQQDAjCBuDEL
|
||||
MAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNpc2Nv
|
||||
MRowGAYDVQQJExExMDEgU2Vjb25kIFN0cmVldDEOMAwGA1UEERMFOTQxMDUxFzAV
|
||||
BgNVBAoTDkhhc2hpQ29ycCBJbmMuMT8wPQYDVQQDEzZDb25zdWwgQWdlbnQgQ0Eg
|
||||
NjQyMDkzNzU2Nzk2MDMyOTY4MTA4MDI5ODk2NTUzNjQ4OTI3NzcwHhcNMjAwODI3
|
||||
MTYxOTE4WhcNMjUwODI2MTYxOTE4WjCBuDELMAkGA1UEBhMCVVMxCzAJBgNVBAgT
|
||||
AkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNpc2NvMRowGAYDVQQJExExMDEgU2Vjb25k
|
||||
IFN0cmVldDEOMAwGA1UEERMFOTQxMDUxFzAVBgNVBAoTDkhhc2hpQ29ycCBJbmMu
|
||||
MT8wPQYDVQQDEzZDb25zdWwgQWdlbnQgQ0EgNjQyMDkzNzU2Nzk2MDMyOTY4MTA4
|
||||
MDI5ODk2NTUzNjQ4OTI3NzcwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASUDPnD
|
||||
lfeWaTrJHZ9JzovcEXTGh2VKOaq4a1GceAqYNg1Jj2A6+6Je9Nm5+tvVn939ZS0z
|
||||
NQGjuL3vdxJN96sYo3sweTAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB
|
||||
/zApBgNVHQ4EIgQg7s5SJjjgtyy/XUHwQk43iXapCXQIIFqOivTddv6RGacwKwYD
|
||||
VR0jBCQwIoAg7s5SJjjgtyy/XUHwQk43iXapCXQIIFqOivTddv6RGacwCgYIKoZI
|
||||
zj0EAwIDRwAwRAIgGj3Z1yyMTcdsZiFu89Si0E9ueX2CAAztWabhbvzMOl4CIHIv
|
||||
DhH1LG5/DHuJCQA4MAKLiDzt1/XQoS1FJiguyorb
|
||||
-----END CERTIFICATE-----
|
|
@ -1,17 +0,0 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIICpzCCAkygAwIBAgIRAP+zqvMlaJNYzixVwgrrYrkwCgYIKoZIzj0EAwIwgbgx
|
||||
CzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTEWMBQGA1UEBxMNU2FuIEZyYW5jaXNj
|
||||
bzEaMBgGA1UECRMRMTAxIFNlY29uZCBTdHJlZXQxDjAMBgNVBBETBTk0MTA1MRcw
|
||||
FQYDVQQKEw5IYXNoaUNvcnAgSW5jLjE/MD0GA1UEAxM2Q29uc3VsIEFnZW50IENB
|
||||
IDY0MjA5Mzc1Njc5NjAzMjk2ODEwODAyOTg5NjU1MzY0ODkyNzc3MB4XDTIwMDgy
|
||||
NzE3MjcxMVoXDTIxMDgyNzE3MjcxMVowITEfMB0GA1UEAxMWc2VydmVyLmNvbHVt
|
||||
YmlhLmNvbnN1bDBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJ/z9e9ctu6x4GqX
|
||||
Gmrc69JeusbmpEEkO35LIVngEc4fqF0eup2/txiQZhmyDuYKN8ObcLzQ9/6OJkRD
|
||||
a47UTzCjgcwwgckwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMB
|
||||
BggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMCkGA1UdDgQiBCB85H1w+4sYpvxg7b5x
|
||||
Yr8/psiaIxNGDioU4OXxAMUabTArBgNVHSMEJDAigCDuzlImOOC3LL9dQfBCTjeJ
|
||||
dqkJdAggWo6K9N12/pEZpzAyBgNVHREEKzApghZzZXJ2ZXIuY29sdW1iaWEuY29u
|
||||
c3Vsgglsb2NhbGhvc3SHBH8AAAEwCgYIKoZIzj0EAwIDSQAwRgIhALqDdmHhRnos
|
||||
BTc5zpSdnv1NUU+DkGqG8bfisN9YYhf3AiEAoiaT7DBzgHv2Po37P/YZm2nMjMdd
|
||||
W2dTCuysw+L3Syk=
|
||||
-----END CERTIFICATE-----
|
|
@ -1,17 +0,0 @@
|
|||
[Unit]
|
||||
Description=Consul Service Discovery Agent
|
||||
After=network-online.target
|
||||
|
||||
[Service]
|
||||
Type=simple
|
||||
Restart=on-failure
|
||||
User=consul
|
||||
Group=consul
|
||||
RestartSec=3
|
||||
StateDirectory=consul
|
||||
ExecStart=/usr/local/bin/consul agent -config-dir /etc/consul.d/
|
||||
ExecReload=/bin/kill -HUP $MAINPID
|
||||
KillSignal=SIGINT
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
|
@ -1,20 +0,0 @@
|
|||
---
|
||||
- name: daemon_reload
|
||||
systemd:
|
||||
daemon_reload: True
|
||||
|
||||
- name: reload_consul_debian
|
||||
systemd:
|
||||
name: consul
|
||||
state: reloaded
|
||||
|
||||
- name: restart_consul_debian
|
||||
systemd:
|
||||
name: consul
|
||||
state: restarted
|
||||
|
||||
- name: restart_consul_fbsd
|
||||
service:
|
||||
name: consul
|
||||
state: restarted
|
||||
...
|
|
@ -1,122 +0,0 @@
|
|||
---
|
||||
- name: ensure consul group
|
||||
group:
|
||||
name: consul
|
||||
state: present
|
||||
system: True
|
||||
|
||||
- name: ensure consul user
|
||||
user:
|
||||
name: consul
|
||||
state: present
|
||||
group: consul
|
||||
system: True
|
||||
|
||||
- name: ensure consul config dir
|
||||
file:
|
||||
path: /etc/consul.d/
|
||||
state: directory
|
||||
owner: consul
|
||||
group: consul
|
||||
mode: 0755
|
||||
|
||||
- name: ensure consul certs dir
|
||||
file:
|
||||
path: /etc/consul.d/certs/
|
||||
state: directory
|
||||
owner: consul
|
||||
group: consul
|
||||
mode: 0755
|
||||
|
||||
- name: check if server cert is expiring in the next 5 days
|
||||
shell: "openssl x509 -checkend 432000 -noout -in /etc/consul.d/certs/consul-server.pem"
|
||||
args:
|
||||
executable: /bin/bash
|
||||
failed_when: False
|
||||
check_mode: False
|
||||
changed_when: False
|
||||
register: exp
|
||||
|
||||
- name: get cert
|
||||
shell: "vault write pki_int/issue/{{ vault_pki_policy }} common_name=server.{{ main_dc_name }}.{{ consul_domain }} alt_names=consul.service.{{ consul_domain }},consul.service.{{ main_dc_name }}.{{ consul_domain }} ttl=43200m"
|
||||
args:
|
||||
executable: /bin/bash
|
||||
environment:
|
||||
VAULT_ADDR: https://vault.service.masked.name:8200
|
||||
VAULT_TOKEN: "{{ lookup('file', lookup('env', 'HOME') + '/.vault-token') }}"
|
||||
VAULT_FORMAT: json
|
||||
register: cert_data
|
||||
when: exp.rc != 0
|
||||
notify: reload_consul_debian
|
||||
|
||||
- name: write cert data to server
|
||||
copy:
|
||||
content: "{{ item.content }}"
|
||||
dest: "/etc/consul.d/certs/{{ item.path }}"
|
||||
mode: '{{ item.mode }}'
|
||||
owner: consul
|
||||
group: consul
|
||||
when: cert_data.changed
|
||||
loop:
|
||||
- {
|
||||
content: "{{ (cert_data.stdout | from_json).data.certificate }}",
|
||||
path: "consul-server.pem",
|
||||
mode: "0755"
|
||||
}
|
||||
- {
|
||||
content: "{{ (cert_data.stdout | from_json).data.private_key }}",
|
||||
path: "consul-server.key",
|
||||
mode: "0600"
|
||||
}
|
||||
|
||||
- name: ensure consul data dir
|
||||
file:
|
||||
path: /opt/consul
|
||||
state: directory
|
||||
owner: consul
|
||||
group: consul
|
||||
mode: 0755
|
||||
|
||||
- name: check consul version
|
||||
shell:
|
||||
cmd: "consul --version | head -1 | cut -d'v' -f2"
|
||||
args:
|
||||
executable: /bin/bash
|
||||
changed_when: False
|
||||
register: installed_consul_version
|
||||
check_mode: False
|
||||
|
||||
- name: get consul
|
||||
unarchive:
|
||||
src: "https://releases.hashicorp.com/consul/{{ consul_version }}/consul_{{ consul_version }}_linux_amd64.zip"
|
||||
dest: /usr/local/bin/
|
||||
mode: 0755
|
||||
owner: root
|
||||
group: root
|
||||
remote_src: True
|
||||
when: installed_consul_version.stdout != consul_version
|
||||
|
||||
- name: copy consul unit file
|
||||
copy:
|
||||
src: files/consul.service
|
||||
dest: /etc/systemd/system/consul.service
|
||||
mode: 0755
|
||||
owner: root
|
||||
group: root
|
||||
notify: daemon_reload
|
||||
|
||||
- name: template consul config
|
||||
template:
|
||||
src: templates/consul.hcl.j2
|
||||
dest: /etc/consul.d/consul.hcl
|
||||
owner: root
|
||||
group: consul
|
||||
mode: 0750
|
||||
notify: restart_consul_debian
|
||||
|
||||
- name: ensure consul is started and enabled
|
||||
systemd:
|
||||
name: consul
|
||||
state: started
|
||||
enabled: True
|
||||
...
|
|
@ -1,3 +0,0 @@
|
|||
---
|
||||
- include_tasks: "{{ ansible_os_family }}.yml"
|
||||
...
|
|
@ -1,54 +0,0 @@
|
|||
datacenter = "{{ main_dc_name }}"
|
||||
primary_datacenter = "{{ main_dc_name }}"
|
||||
domain = "{{ consul_domain }}"
|
||||
node_name = "{{ inventory_hostname_short }}"
|
||||
server = true
|
||||
bootstrap_expect = 3
|
||||
ui = true
|
||||
|
||||
encrypt = "{{ lookup('hashi_vault', 'secret=kv/data/consul:gossip ca_cert=/etc/pki/certs/MaskedName_Root_CA.crt') }}"
|
||||
|
||||
verify_outgoing = true
|
||||
verify_server_hostname = true
|
||||
verify_incoming_https = false
|
||||
verify_incoming_rpc = true
|
||||
ca_file = "/etc/pki/certs/{{ vault_ca_cert_name }}"
|
||||
cert_file = "{{ consul_config_path }}/certs/consul-server.pem"
|
||||
key_file = "{{ consul_config_path }}/certs/consul-server.key"
|
||||
|
||||
auto_encrypt {
|
||||
allow_tls = true
|
||||
}
|
||||
|
||||
bind_addr = "{{ ansible_default_ipv4.address }}"
|
||||
start_join = ["{{ groups['consul_server'] | map('extract', hostvars, ['ansible_default_ipv4', 'address']) | join('","') }}"]
|
||||
|
||||
data_dir = "/opt/consul"
|
||||
log_level = "INFO"
|
||||
raft_protocol = 3
|
||||
|
||||
enable_local_script_checks = true
|
||||
|
||||
addresses {
|
||||
http = "127.0.0.1"
|
||||
https = "0.0.0.0"
|
||||
dns = "0.0.0.0"
|
||||
}
|
||||
|
||||
ports {
|
||||
http = 8500
|
||||
https = 8501
|
||||
}
|
||||
|
||||
performance {
|
||||
raft_multiplier = 1
|
||||
}
|
||||
|
||||
acl {
|
||||
enabled = true
|
||||
default_policy = "deny"
|
||||
enable_token_persistence = true
|
||||
tokens {
|
||||
default = "{{ lookup('hashi_vault', 'secret=kv/data/consul:server-acl-token ca_cert=/etc/pki/certs/MaskedName_Root_CA.crt') }}"
|
||||
}
|
||||
}
|
|
@ -1,9 +1,4 @@
|
|||
---
|
||||
- name: reload consul
|
||||
service:
|
||||
name: consul
|
||||
state: reloaded
|
||||
|
||||
- name: restart docker
|
||||
docker_container:
|
||||
name: docker-repo
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
register: exp
|
||||
|
||||
- name: get cert
|
||||
shell: "vault write pki_int/issue/{{ vault_pki_policy }} common_name=docker-repo.service.{{ consul_domain }} alt_names=docker-repo.service.{{ main_dc_name }}.{{ consul_domain }} ttl=43200m"
|
||||
shell: "vault write pki_int/issue/{{ vault_pki_policy }} common_name=docker-repo.service.masked.name ttl=43200m"
|
||||
args:
|
||||
executable: /bin/bash
|
||||
environment:
|
||||
|
@ -82,13 +82,4 @@
|
|||
- "{{ docker_repo_storage }}:/data"
|
||||
- "/etc/docker-repo/certs:/certs"
|
||||
restart_policy: always
|
||||
|
||||
- name: ensure docker repo service config exists
|
||||
copy:
|
||||
src: files/docker-repo.hcl
|
||||
dest: /etc/consul.d/docker-repo.hcl
|
||||
mode: 0750
|
||||
owner: consul
|
||||
group: consul
|
||||
notify: reload consul
|
||||
...
|
||||
|
|
|
@ -37,6 +37,14 @@
|
|||
group: vault
|
||||
mode: 0755
|
||||
|
||||
- name: ensure vault raft dir
|
||||
file:
|
||||
path: /opt/vault/
|
||||
state: directory
|
||||
owner: vault
|
||||
group: vault
|
||||
mode: 0755
|
||||
|
||||
- name: check if server cert is expiring in the next 5 days
|
||||
shell: "openssl x509 -checkend 432000 -noout -in /etc/vault.d/certs/vault.pem"
|
||||
args:
|
||||
|
@ -47,7 +55,7 @@
|
|||
register: exp
|
||||
|
||||
- name: get cert
|
||||
shell: "vault write pki_int/issue/{{ vault_pki_policy }} common_name=vault.service.{{ consul_domain }} alt_names=vault.service.{{ main_dc_name }}.{{ consul_domain }} ttl=43200m"
|
||||
shell: "vault write pki_int/issue/{{ vault_pki_policy }} common_name=vault.service.masked.name ip_sans={{ ansible_default_ipv4.address }} ttl=43200m"
|
||||
args:
|
||||
executable: /bin/bash
|
||||
environment:
|
||||
|
|
|
@ -1,5 +1,8 @@
|
|||
ui = true
|
||||
|
||||
api_addr = "https://{{ ansible_default_ipv4.address }}:8200"
|
||||
cluster_addr = "https://{{ ansible_default_ipv4.address }}:8201"
|
||||
|
||||
listener "tcp" {
|
||||
address = "127.0.0.1:8200"
|
||||
tls_cert_file = "/etc/vault.d/certs/vault.pem"
|
||||
|
@ -12,11 +15,7 @@ listener "tcp" {
|
|||
tls_key_file = "/etc/vault.d/certs/vault.key"
|
||||
}
|
||||
|
||||
api_addr = "https://{{ ansible_default_ipv4.address }}:8200"
|
||||
cluster_addr = "https://{{ ansible_default_ipv4.address }}:8201"
|
||||
|
||||
storage "consul" {
|
||||
address = "localhost:8500"
|
||||
path = "vault/"
|
||||
token = "{{ lookup('hashi_vault', 'secret=kv/data/vault:consul-acl ca_cert=/etc/pki/certs/MaskedName_Root_CA.crt') }}"
|
||||
storage "raft" {
|
||||
path = "/opt/vault/"
|
||||
node_id = "{{ inventory_hostname_short }}"
|
||||
}
|
||||
|
|
|
@ -1,6 +0,0 @@
|
|||
---
|
||||
- name: reload consul
|
||||
service:
|
||||
name: consul
|
||||
state: reloaded
|
||||
...
|
|
@ -3,13 +3,4 @@
|
|||
snap:
|
||||
name: wekan
|
||||
state: present
|
||||
|
||||
- name: add wekan consul service
|
||||
copy:
|
||||
src: files/wekan.hcl
|
||||
dest: /etc/consul.d/wekan.hcl
|
||||
mode: 0750
|
||||
owner: consul
|
||||
group: consul
|
||||
notify: reload consul
|
||||
...
|
||||
|
|
Loading…
Reference in a new issue