Hi Jakob,
On Sun, Nov 22, 2015 at 2:01 PM, Jakob Gillich <
jakob....@gmail.com> wrote:
> Hi Jeff,
>
> thanks, that helped a lot!
>
> 1) That makes sense, although when it comes to storing all your passwords on
> some server, I'd prefer the breaking-glass scenario to be all secrets
> inaccessible. But that's obviously not what Vault was designed for.
You can revoke the root token. So you could, for instance, set up a
series of tokens with sudo privileges to needed paths, and revoke the
root token, thereby ensuring that no token has access to /sys/raw. The
root token is required in order to perform initial setup -- set up
auth backends, for instance (or to make other tokens to do that) --
but other than an initial way to get things set up, it's a token like
anything else. So your break-glass scenario could certainly be to make
all secrets inaccessible, and Vault is totally designed for that to be
a possible scenario...it just requires you to set things up that way.
> 2) Templating in policies would be really neat.
Agreed. Right now, I don't think this will come in the next couple of
releases, but it would be cool if we could eventually get it in there.
> 3) Sorry that question was a bit silly. ;) What I meant to ask is if the
> consul limits are any different with Vault, but I take from your answer that
> they aren't.
Vault and Consul don't scale the same because they don't use the same
mechanism for leader election...Vault piggybacks on Consul's Raft log.
So Consul requires an odd number of nodes and generally you don't want
this to be past 7 at the most because of coordination needs -- but you
can throw Vault on 1k servers and it won't matter, because whichever
node gets the lock (using Consul's atomic lock capability) is the one
that is leader. Generally 2 Vault nodes is enough, but many like to
run 3 just in case.
--Jeff