Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feature: Helm chart for Kubernetes deployment #24

Open
4 tasks done
babykart opened this issue Nov 14, 2022 · 4 comments
Open
4 tasks done

feature: Helm chart for Kubernetes deployment #24

babykart opened this issue Nov 14, 2022 · 4 comments
Labels
enhancement New feature or request

Comments

@babykart
Copy link

✨ Describe the feature you'd like

It would be cool to deploy vault-unseal via a helm chart in a Kubernetes cluster.

🌧 Is your feature request related to a problem?

No response

πŸ”Ž Describe alternatives you've considered

I've considered to write 3 deployments with their respective secret.
With a Helm chart, I will be able to deploy vault-unseal for example in 3 distinct namespaces with a GitOps tool (ArgoCD, Flux...).
In fact, Helm chart is clearly a standard in the Kubernetes ecosystem and it would be a nice-to-have deployment for this very usefull project.

⚠ If implemented, do you think this feature will be a breaking change to users?

No

βš™ Additional context

No response

🀝 Requirements

  • I have confirmed that someone else has not submitted a similar feature request.
  • If implemented, I believe this feature will help others, in addition to solving my problems.
  • I have looked into alternative solutions to the best of my ability.
  • (optional) I would be willing to contribute to testing this feature if implemented, or making a PR to implement this functionality.
@babykart babykart added the enhancement New feature or request label Nov 14, 2022
@lrstanley lrstanley changed the title feature: [Helm chart for Kubernetes deployment] feature: Helm chart for Kubernetes deployment Nov 14, 2022
@lrstanley
Copy link
Owner

Have been planning to do this for a while, and can likely tackle it soon, as I now have more experience with making and maintaining helm charts.

@babykart
Copy link
Author

While waiting for the official helm chart, I use this one for my needs.

@lrstanley
Copy link
Owner

Some notes for myself before I actually start the work on this:

  1. Determine concerns with running inside or outside of a Vault namespace (or if Vault is running outside of the cluster). If users do want to run both within the cluster, they should probably be in separate namespaces and we should probably recommend this.
  2. Need to finally transition to supporting more than the config file -- flags and environment variables should support everything inside of the config. Don't want to force requiring a secret that has the entire config.
    • Tokens (and potentially other configs) should be modular. I.e. you can just have those be a part of a separate secret/config. Would make it easier to automate as well.
  3. Default topology to be by hostname (i.e. default to requiring at least as many nodes as vault-unseal instances). Would both ensure one node doesn't kill the ability to recover, as well as reduce the chance that some level of node compromise will compromise all instances.
    • Leave other AZ constraints to the user, as not all users may have the option.
  4. PSPs, AppArmor/Seccomp can reduce outward attack vectors, but what about the inverse? Is there anything we can do?

Planning on having the chart externalized into a dedicated repo for other helm charts I maintain, as I have 3-5 others already planned, and have some automation in place to automatically submit PRs when new versions of the base software (e.g. vault-unseal) release new versions. Still WIP though: https://github.com/lrstanley/helm-charts

@soakes
Copy link

soakes commented Jun 21, 2024

While waiting for the official helm chart, I use this one for my needs.

Thanks @babykart for providing this solution.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants