docs: consul on k8s doesn't support external servers requiring mTLS (#8484)

This commit is contained in:
Iryna Shustava 2020-08-13 12:04:34 -07:00 committed by GitHub
parent 2ed33089aa
commit cd3d6adbf4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 7 additions and 0 deletions

View File

@ -52,6 +52,13 @@ You may also consider adopting Consul Enterprise for
## Configuring TLS with Auto-encrypt ## Configuring TLS with Auto-encrypt
-> **Note:** Consul on Kubernetes currently does not support external servers that require mutual authentication
for the HTTPS clients of the Consul servers, that is when servers have either
`verify_incoming` or `verify_incoming_https` set to `true`.
As noted in the [Security Model](docs/internals/security#secure-configuration),
that setting isn't strictly necessary to support Consul's threat model as it is recommended that
all requests contain a valid ACL token.
Consul's auto-encrypt feature allows clients to automatically provision their certificates by making a request to the servers at startup. Consul's auto-encrypt feature allows clients to automatically provision their certificates by making a request to the servers at startup.
If you would like to use this feature with external Consul servers, you need to configure the Helm chart with information about the servers If you would like to use this feature with external Consul servers, you need to configure the Helm chart with information about the servers
so that it can retrieve the clients' CA to use for securing the rest of the cluster. so that it can retrieve the clients' CA to use for securing the rest of the cluster.