2022-04-07 18:16:24 +00:00
---
layout: docs
page_title: Storing the Enterprise License in Vault
description: >-
Configuring the Consul Helm chart to use an enterprise license stored in Vault.
---
# Storing the Enterprise License in Vault
2022-06-17 16:23:54 +00:00
This topic describes how to configure the Consul Helm chart to use an enterprise license stored in Vault.
2022-04-07 18:16:24 +00:00
## Overview
2023-01-25 16:52:43 +00:00
Complete the steps outlined in the [Data Integration](/consul/docs/k8s/deployment-configurations/vault/data-integration) section to use an enterprise license stored in Vault.
2022-04-07 18:16:24 +00:00
2022-07-15 16:35:42 +00:00
Complete the following steps once:
2022-04-07 18:16:24 +00:00
1. Store the secret in Vault.
1. Create a Vault policy that authorizes the desired level of access to the secret.
2022-07-15 16:35:42 +00:00
Repeat the following steps for each datacenter in the cluster:
2022-04-07 18:16:24 +00:00
1. Create Vault Kubernetes auth roles that link the policy to each Consul on Kubernetes service account that requires access.
2022-06-17 16:23:54 +00:00
1. Update the Consul on Kubernetes helm chart.
## Prerequisites
Prior to setting up the data integration between Vault and Consul on Kubernetes, you will need to have:
2023-01-25 16:52:43 +00:00
1. Read and completed the steps in the [Systems Integration](/consul/docs/k8s/deployment-configurations/vault/systems-integration) section of [Vault as a Secrets Backend](/consul/docs/k8s/deployment-configurations/vault).
2. Read the [Data Integration Overview](/consul/docs/k8s/deployment-configurations/vault/data-integration) section of [Vault as a Secrets Backend](/consul/docs/k8s/deployment-configurations/vault).
2022-04-07 18:16:24 +00:00
2022-07-15 16:35:42 +00:00
## Store the Secret in Vault
2022-04-07 18:16:24 +00:00
First, store the enterprise license in Vault:
```shell-session
2024-01-05 11:22:56 +00:00
$ vault kv put consul-kv/secret/enterpriselicense key="<enterprise license>"
2022-04-07 18:16:24 +00:00
```
2022-07-15 16:35:42 +00:00
## Create Vault policy
2022-04-07 18:16:24 +00:00
2022-07-15 16:35:42 +00:00
Next, you will need to create a policy that allows read access to this secret.
2022-04-07 18:16:24 +00:00
2022-07-15 16:35:42 +00:00
The path to the secret referenced in the `path` resource is the same value that you will configure in the `global.enterpriseLicense.secretName` Helm configuration (refer to [Update Consul on Kubernetes Helm chart](#update-consul-on-kubernetes-helm-chart)).
2022-04-07 18:16:24 +00:00
<CodeBlockConfig filename="license-policy.hcl">
```HCL
2024-01-05 11:22:56 +00:00
path "consul-kv/data/secret/enterpriselicense" {
2022-04-07 18:16:24 +00:00
capabilities = ["read"]
}
```
</CodeBlockConfig>
Apply the Vault policy by issuing the `vault policy write` CLI command:
```shell-session
$ vault policy write license-policy license-policy.hcl
```
2022-07-15 16:35:42 +00:00
## Create Vault Authorization Roles for Consul
2022-04-07 18:16:24 +00:00
Next, you will create Kubernetes auth roles for the Consul server and client:
```shell-session
$ vault write auth/kubernetes/role/consul-server \
bound_service_account_names=<Consul server service account> \
bound_service_account_namespaces=<Consul installation namespace> \
policies=license-policy \
ttl=1h
```
```shell-session
$ vault write auth/kubernetes/role/consul-client \
bound_service_account_names=<Consul client service account> \
bound_service_account_namespaces=<Consul installation namespace> \
policies=license-policy \
ttl=1h
```
To find out the service account names of the Consul server and client,
you can run the following `helm template` commands with your Consul on Kubernetes values file:
- Generate Consul server service account name
```shell-session
2022-09-30 16:13:44 +00:00
$ helm template --release-name ${RELEASE_NAME} -s templates/server-serviceaccount.yaml hashicorp/consul -f values.yaml
2022-04-07 18:16:24 +00:00
```
- Generate Consul client service account name
```shell-session
2022-09-30 16:13:44 +00:00
$ helm template --release-name ${RELEASE_NAME} -s templates/client-serviceaccount.yaml hashicorp/consul -f values.yaml
2022-04-07 18:16:24 +00:00
```
2022-07-15 16:35:42 +00:00
## Update Consul on Kubernetes Helm chart.
2022-04-07 18:16:24 +00:00
Now that you have configured Vault, you can configure the Consul Helm chart to
use the enterprise enterprise license in Vault:
<CodeBlockConfig filename="values.yaml">
```yaml
global:
2022-05-12 20:27:11 +00:00
image: hashicorp/consul-enterprise:1.12.0-ent
2022-04-07 18:16:24 +00:00
secretsBackend:
vault:
enabled: true
consulServerRole: consul-server
consulClientRole: consul-client
enterpriseLicense:
2024-01-05 11:22:56 +00:00
secretName: consul-kv/data/secret/enterpriselicense
2022-04-07 18:16:24 +00:00
secretKey: key
```
</CodeBlockConfig>
Note that `global.enterpriseLicense.secretName` is the path of the secret in Vault.
This should be the same path as the one you included in your Vault policy.
`global.enterpriseLicense.secretKey` is the key inside the secret data. This should be the same
as the key you passed when creating the enterprise license secret in Vault.