-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Customized CA cert for consul client #2307
Comments
Answered this here - https://groups.google.com/d/msg/consul-tool/heBdAm4NfMU/nh7B4a5gFgAJ. |
I have created a pull request for this enhancement (#2423). Travis CI build failed because of some existing failures. |
The change in #1984 adds the ability to use TLS but skip certificate verification if desired. This is probably a good way to fix this vs. adding the complexity of another CA configuration. If you care about cert verifications for your health checks you can set up your system certs, and if you don't you can turn off verification. Please let me know if you have any concerns about this approach! |
Just started to use consul and recently decided to get the services endpoints to use SSL, and I'm having the same issue with the healthchecks to https endpoints - returning
I know we can pass the
I can confirm that the TLS verification is working fine when running consul outside of docker - on my particular case on a windows VM. |
I am using Consul v0.6.4 and running on FreeBSD. My services are registered with Consul with a health check URL with https. I have created my own ca certificate and placed at /etc/ssl/certs/ location. I don't want to place ca content into ca-root-nss.crt file.
verify_outgoing is et to true and ca_file also defined with location. But health check URL is not able to connect to my services and getting error "x509: certificate signed by unknown authority".
ca_file is configured, but getting validated with ca-root-nss.crt, but expectation is that the validation should be done with the customized ca file location. I have tested with openssl s_client with -CApath (openssl s_client -connect IP:Port -CApath /etc/ssl/certs) and it worked but I did not find any similar configuration with Consul. I have came across a ticket (hashicorp/vault#378) with same kind of requirement but changes are done for vault.
How do I configure consul, so that outgoing request from consul should consider customized ca-path instead of system default cert.pem.
The text was updated successfully, but these errors were encountered: