Hello Consul friends!
I'm in the middle of deploying a Vault cluster, backed by a Consul cluster for the storage backend. Initially I was fronting my Vault cluster with an AWS ELB but after talking to Jeff Mitchell, I've decided to switch to using Consul for service discovery.
I'm using a custom CA (created using Certstrap by Sqaure) for all the TLS server & client certificates.
I've configured the service definition for Vault as follows:
{
"service":{
"id": "vault1",
"name": "vault",
"tags": ["secrets","development","aws"],
"address": "<IP Addr>",
"port": 8202,
"check": {
"id": "api",
"name": "HTTP API check on port 8202",
"http": "https://<IP Addr>:8202/v1/sys/health",
"interval": "5s",
"timeout" : "2s"
}
}
}
However, when I bounce my Consul node, I receive the following error:
In my Consul server config, I've configured the ca_file to point to the public certificate for my custom CA, and that appears to be working as data is synced between the nodes in my Consul Cluster.
Is there a way to specify a custom CA certificate for health checks or does Consul fully depend on the underlying OS for determining valid root certificates?
Cheers,
Matthew