| 21 May 2022 |
| Martin joined the room. | 21:01:36 |
| 22 May 2022 |
| Emantor joined the room. | 08:52:04 |
| 23 May 2022 |
| Florian joined the room. | 14:19:22 |
| 24 May 2022 |
| mixis joined the room. | 16:28:49 |
| bernardo left the room. | 21:00:22 |
| 25 May 2022 |
Mic92 (Old) | Not sure what the best channel for this question is, but do you have some automation/recommndation on how to bootstrap vault access on new machines? | 10:41:04 |
| 27 May 2022 |
@grahamc:nixos.org | hardware? | 13:23:17 |
@grahamc:nixos.org | * bare metal hardware that you own? | 13:23:23 |
@grahamc:nixos.org | Mic92: ^ | 13:23:49 |
@grahamc:nixos.org | for people I push them through logging in with google apps, for bare metal hardware I was working on this but didn't end up needing it: https://github.com/grahamc/vault-credential-yubikey | 13:24:45 |
@grahamc:nixos.org | (but it completely works) | 13:24:56 |
Mic92 (Old) | In reply to @grahamc:nixos.org Mic92: ^ Let's say something cloud-vendor neutral. I need to be able to migrate if possible. | 13:25:26 |
@grahamc:nixos.org | I'd use whatever auto auth method you can built-in to vault, trying to remain vendor neutral on that is (imho) missing out on a lot of really good security engineering | 13:26:34 |
@grahamc:nixos.org | ie: AWS, Azure, GCP, etc. all have built-in automatic authentication mechanisms that I'd take advantage of | 13:27:13 |
Mic92 (Old) | Do you usually deploy vault enterprise? | 13:27:24 |
@grahamc:nixos.org | no | 13:27:36 |
@grahamc:nixos.org | I don't have that kind of budget 😓 | 13:27:53 |
Mic92 (Old) | Ok. How do you manage TLS? I just bootstrapped something with cfssl for now | 13:29:11 |
Mic92 (Old) | And also how do you unseal? | 13:29:18 |
@grahamc:nixos.org | letsencrypt | 13:29:20 |
@grahamc:nixos.org | https://learn.hashicorp.com/tutorials/vault/autounseal-aws-kms | 13:29:50 |
@grahamc:nixos.org | this is how we generally integrate vault with our services: https://github.com/DeterminateSystems/nixos-vault-service | 13:30:04 |
Mic92 (Old) | Ah, I thought aws kms unseal is only available in the enterprise edition | 13:30:35 |
@grahamc:nixos.org | nope | 13:30:40 |
Mic92 (Old) | Which is why I did not use it | 13:30:43 |
@grahamc:nixos.org | kms unseal + dynamodb as the backend | 13:31:03 |
@grahamc:nixos.org | makes it relatively easy to deploy using AMIs and not permit SSH access to the vault hosts | 13:31:25 |
@grahamc:nixos.org | (which is considered best practice for vault servers) | 13:31:58 |
Mic92 (Old) | So to update your fault server, you have to upload a new AMI? | 13:33:50 |
Mic92 (Old) | *vault | 13:33:54 |