You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. Create the HAProxy config to reverse proxy the Vault HA container
91
-
92
-
Set the vault_front to the external VIP address or internal VIP address depending on the installation. Set the vault_back to the IPs of the control nodes.
93
-
94
-
Set the following in etc/kayobe/kolla/config/haproxy/services.d/vault.cfg or if environments are being used etc/kayobe/environments/$KAYOBE_ENVIRONMENT/kolla/config/haproxy/services.d/vault.cfg
95
-
96
-
.. code-block::
97
-
98
-
# Delete "verify none" if not using self-signed/unknown issuer
It is possible to expose the overcloud Vault service via the Kolla Ansible HAProxy load balancer.
183
+
This provides a single highly available API endpoint, as well as monitoring of the Vault backends when combined with Prometheus.
184
+
HAProxy integration is no longer required for generating OpenStack control plane certificates, making it possible to deploy Vault and generate certificates before any containers have been deployed by Kolla Ansible.
185
+
186
+
1. Create the HAProxy config to reverse proxy the Vault HA container
187
+
188
+
Set the vault_front to the external VIP address or internal VIP address depending on the installation. Set the vault_back to the IPs of the control nodes.
189
+
190
+
Set the following in etc/kayobe/kolla/config/haproxy/services.d/vault.cfg or if environments are being used etc/kayobe/environments/$KAYOBE_ENVIRONMENT/kolla/config/haproxy/services.d/vault.cfg
191
+
192
+
.. code-block::
193
+
194
+
# Delete "verify none" if not using self-signed/unknown issuer
0 commit comments