Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support hostNetwork on the server StatefulSet #643

Closed
kopiczko opened this issue Nov 4, 2021 · 2 comments · Fixed by #775
Closed

Support hostNetwork on the server StatefulSet #643

kopiczko opened this issue Nov 4, 2021 · 2 comments · Fixed by #775
Labels
enhancement New feature or request

Comments

@kopiczko
Copy link

kopiczko commented Nov 4, 2021

Is your feature request related to a problem? Please describe.
We'd like to reuse K8s API etcd as a backend for the vault instance running inside the cluster. This is CAPI cluster where etcd pod runs in the host network bound to localhost. This etcd pod doesn't expose any ports. There isn't really way to expose this port cleanly because it's created with upstream controllers. We'd like to run vault server in the host network to make it possible to reach the etcd.

Describe the solution you'd like
Add server.hostNetwork setting.

Describe alternatives you've considered
We were thinking about exposing etcd with a proxy but that may make it complicated with the certificates.

Additional context
N/A. I'm happy to provide a PR if this is something you'd accept.

@kopiczko kopiczko added the enhancement New feature or request label Nov 4, 2021
@dealweb723
Copy link

I'm encountering a similar request as this. Any updates?

@kopiczko
Copy link
Author

@dealweb723 what we are doing right now is:

...

  tolerations:
    - key: "node-role.kubernetes.io/master"
      operator: "Exists"

...

    config: |
      backend "etcd" {
        address = "https://HOST_IP:2379"
        
        ...

      }

...

The downside here is that it has to run on the control plane.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants