-
Notifications
You must be signed in to change notification settings - Fork 885
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding vault poststart hook/configs #252
Conversation
Hi @rohitrsh, my apologies but there seems to be some confusion about what we talked about. What I was referring to was the This job is useful, however, at this time we're not looking to automate initialization. Instead this PR should be focused on adding |
Hi @jasonodonnell , Initially i tried with vault-helm/templates/server-statefulset.yaml Line 109 in 2b137c9
Because till the time its not pass pod status will be I do not wanted make changes in the healthcheck thats why I choose this do be done using helm post-install hook. If its fine to change the healthcheck to the port Let me know your thought on that. |
@rohitrsh if you use the HTTP check instead, you can make it go ready depending on different criteria: server:
readinessProbe:
enabled: true
path: /v1/sys/health?standbyok=true&sealedcode=204&uninitcode=204 This will make Vault report ready even if it's sealed or uninitialized (liveliness probe can be changed to report different status). |
@jasonodonnell, cool that just tested that worked. One quick question I have how we are planning to pass the |
@rohitrsh This can already be done via the server:
postStart:
command: ["/vault/userconfig/myinitconfigmap/myscript.sh"] |
@jasonodonnell, Not sure which approach is good to have here The major problem I could see with Wherein with With this approach if vault pod gets stuck or job script is having any issue it can be easily troubleshoot. Most important, users custom script will not have any impact on vault pod startup. Let me know your thought on it. |
@rohitrsh I am looking for same solution where i can perform vault init ,unseal and ldap config as part of vault deployment with helm. |
@jasonodonnell as discussed in #251 adding PR. This performs following tasks.
values.yaml
values.yaml
More auth modes can be control and added using
vault-config.sh
currently it supportsldap
only.