Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

helm:add support for auto-generating gossip encryption secret #663

Closed
kschoche opened this issue Oct 20, 2020 · 1 comment · Fixed by #738
Closed

helm:add support for auto-generating gossip encryption secret #663

kschoche opened this issue Oct 20, 2020 · 1 comment · Fixed by #738
Assignees

Comments

@kschoche
Copy link
Contributor

Currently it is required to BYO the gossip encryption key, and this is documented in the values.yaml file:

 # gossipEncryption configures which Kubernetes secret to retrieve Consul's
 # gossip encryption key from (see https://www.consul.io/docs/agent/options.html#_encrypt).
 # If secretName or secretKey are not set, gossip encryption will not be enabled.
 # The secret must be in the same namespace that Consul is installed into.
 #
 # The secret can be created by running:
 #    kubectl create secret generic consul-gossip-encryption-key \
 #      --from-literal=key=$(consul keygen).
 #

It would be helpful to have the option to have helm auto-generate the gossip encryption key and install the secret at install time.

@yevgeniyo-ps
Copy link

@kschoche faced with the same and found this solution:
hashicorp/terraform-provider-consul#48

@t-eckert t-eckert changed the title add support for auto-generating gossip encryption secret helm:add support for auto-generating gossip encryption secret Aug 24, 2021
@t-eckert t-eckert transferred this issue from hashicorp/consul-helm Aug 24, 2021
@t-eckert t-eckert self-assigned this Aug 30, 2021
@t-eckert t-eckert linked a pull request Sep 29, 2021 that will close this issue
2 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
3 participants