!agkXCfUrgbadYlQXRj:kack.it

NixOS + TPMs

182 Members
44 Servers

Load older messages


SenderMessageTime
27 May 2022
@mic92:nixos.devMic92 (Old)
In reply to @grahamc:nixos.org
Mic92: ^
Let's say something cloud-vendor neutral. I need to be able to migrate if possible.
13:25:26
@grahamc:nixos.org@grahamc:nixos.orgI'd use whatever auto auth method you can built-in to vault, trying to remain vendor neutral on that is (imho) missing out on a lot of really good security engineering13:26:34
@grahamc:nixos.org@grahamc:nixos.orgie: AWS, Azure, GCP, etc. all have built-in automatic authentication mechanisms that I'd take advantage of13:27:13
@mic92:nixos.devMic92 (Old)Do you usually deploy vault enterprise?13:27:24
@grahamc:nixos.org@grahamc:nixos.orgno13:27:36
@grahamc:nixos.org@grahamc:nixos.orgI don't have that kind of budget 😓13:27:53
@mic92:nixos.devMic92 (Old)Ok. How do you manage TLS? I just bootstrapped something with cfssl for now13:29:11
@mic92:nixos.devMic92 (Old)And also how do you unseal?13:29:18
@grahamc:nixos.org@grahamc:nixos.orgletsencrypt13:29:20
@grahamc:nixos.org@grahamc:nixos.orghttps://learn.hashicorp.com/tutorials/vault/autounseal-aws-kms13:29:50
@grahamc:nixos.org@grahamc:nixos.orgthis is how we generally integrate vault with our services: https://github.com/DeterminateSystems/nixos-vault-service13:30:04
@mic92:nixos.devMic92 (Old)Ah, I thought aws kms unseal is only available in the enterprise edition13:30:35
@grahamc:nixos.org@grahamc:nixos.orgnope13:30:40
@mic92:nixos.devMic92 (Old)Which is why I did not use it13:30:43
@grahamc:nixos.org@grahamc:nixos.orgkms unseal + dynamodb as the backend13:31:03
@grahamc:nixos.org@grahamc:nixos.orgmakes it relatively easy to deploy using AMIs and not permit SSH access to the vault hosts13:31:25
@grahamc:nixos.org@grahamc:nixos.org(which is considered best practice for vault servers)13:31:58
@mic92:nixos.devMic92 (Old)So to update your fault server, you have to upload a new AMI?13:33:50
@mic92:nixos.devMic92 (Old)*vault13:33:54
@grahamc:nixos.org@grahamc:nixos.orgthat is the recommended best-practice for managing Vault servers, yeah13:34:05
@grahamc:nixos.org@grahamc:nixos.orghttps://learn.hashicorp.com/tutorials/vault/production-hardening13:34:41
@grahamc:nixos.org@grahamc:nixos.org"Disable ssh" and "immutable upgrades"13:35:39
@mic92:nixos.devMic92 (Old)I see. Also one can run multiple vault servers on the same dynamo backend, right? https://www.vaultproject.io/docs/configuration/storage/dynamodb13:36:46
@grahamc:nixos.org@grahamc:nixos.orgas long as you setup clustering13:36:56
@grahamc:nixos.org@grahamc:nixos.orgI'd recommend spending a few days to a week playing with vault, setting up a lab, doing clustering, failovers, seal / unseal / etc.13:37:21
@mic92:nixos.devMic92 (Old)I probably won't for now. I would be interested if I later on can migrate to such a setup, if required.13:38:04
@grahamc:nixos.org@grahamc:nixos.orgif you're not going to run multiple vault servers then I would probably recommend either using HCP Vault, or recommend against using vault13:38:40
@grahamc:nixos.org@grahamc:nixos.orgit tends to quickly become an incredibly important cornerstone to infrastructure and it can be somewhat catastrophic if it goes down13:39:08
@mic92:nixos.devMic92 (Old)Ok. So I thought that short downtimes can be handled because vault agent is also caching stuff?13:40:10
@grahamc:nixos.org@grahamc:nixos.orgthe vault agent caches some stuff but not everything13:40:29

Show newer messages


Back to Room ListRoom Version: 6