Hashicorp Vault for internal PKI¶
This document describes how to deploy Hashicorp Vault for internal PKI purposes using the StackHPC Hashicorp collection
Vault may be used as a Certificate Authority to generate certificates for:
OpenStack internal API
OpenStack backend APIs
RabbitMQ
TLS support is described in the Kolla Ansible documentation and the Kayobe documentation.
Vault may also be used as the secret store for Barbican.
Background¶
Our OpenStack environment employs two separate HashiCorp Vault instances. These instances manage the Public Key Infrastructure (PKI) by handling the creation and issuance of certificates.
The first HashiCorp Vault instance is located on the seed host. It handles infrastructure-level certificates, generating the root Certificate Authority (CA) and intermediate CA for the second Vault. The
vault-deploy-seed.yml
playbook sets up this instance.The second HashiCorp Vault instance is within the OpenStack overcloud, located on the controller nodes. This instance uses the intermediate CA from the seed Vault to issue application-specific certificates. The
vault-deploy-overcloud.yml
playbook is used for its setup. It ensures that all controller nodes trust the intermediate CA from the root Vault.
The dual Vault setup enhances security by protecting the root CA’s key. The more exposed overcloud vault only possesses the intermediate key, ensuring that the root key remains secure even if the overcloud Vault instance is compromised.
Prerequisites¶
Before beginning the deployment of vault for openstack internal TLS and backend TLS you should ensure that you have the following.
Seed Node or a host to run the vault container on
Overcloud controller hosts to install second vault on
Ansible Galaxy dependencies installed:
kayobe control host bootstrap
Python dependencies installed:
pip install -r kayobe-config/requirements.txt
By default, Consul and Vault images are not synced from Docker Hub to the local
Pulp. To sync these images, set stackhpc_sync_hashicorp_images
to true
.
The Vault deployment configuration will be automatically updated to pull images
from Pulp.
Deployment¶
Setup Vault on the seed node¶
Run vault-deploy-seed.yml custom playbook
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/vault-deploy-seed.yml
Encrypt generated certs/keys with ansible-vault (use proper location of vault password file)
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/vault/OS-TLS-INT.pem ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/vault/seed-vault-keys.json ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/vault/overcloud.key
Or if environments are being used
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/vault/OS-TLS-INT.pem ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/vault/seed-vault-keys.json ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/vault/overcloud.key
Setup HAProxy config for Vault¶
Create the HAProxy config to reverse proxy the Vault HA container
Set the vault_front to the external VIP address or internal VIP address depending on the installation. Set the vault_back to the IPs of the control nodes.
Set the following in etc/kayobe/kolla/config/haproxy/services.d/vault.cfg or if environments are being used etc/kayobe/environments/$KAYOBE_ENVIRONMENT/kolla/config/haproxy/services.d/vault.cfg
# Delete "verify none" if not using self-signed/unknown issuer {% raw %} frontend vault_front mode tcp option tcplog bind {{ kolla_internal_vip_address }}:8200 default_backend vault_back backend vault_back mode tcp option httpchk GET /v1/sys/health # https://www.vaultproject.io/api-docs/system/health # 200: initialized, unsealed, and active # 501: not initialised (required for bootstrapping) # 503: sealed (required for bootstrapping) http-check expect rstatus (200|501|503) {% for host in groups['control'] %} {% set host_name = hostvars[host].ansible_facts.hostname %} {% set host_ip = 'api' | kolla_address(host) %} server {{ host_name }} {{ host_ip }}:8200 check check-ssl verify none inter 2000 rise 2 fall 5 {% endfor %} {% endraw %}
Deploy HAProxy with the new Vault service configuration:
kayobe overcloud service deploy --skip-tags os_capacity -kt haproxy
Setup Vault HA on the overcloud hosts¶
Run vault-deploy-overcloud.yml custom playbook
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/vault-deploy-overcloud.yml
Encrypt overcloud vault keys (use proper location of vault password file)
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/vault/overcloud-vault-keys.json
Or if environments are being used
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/vault/overcloud-vault-keys.json
Certificates generation¶
Create the external TLS certificates (testing only)¶
Typically external API TLS certificates should be generated by a organisation’s trusted internal or third-party CA. For test and development purposes it is possible to use Vault as a CA for the external API.
Run the playbook
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/vault-generate-test-external-tls.yml
Use ansible-vault to encrypt the PEM bundle in $KAYOBE_CONFIG_PATH/kolla/certificates/haproxy.pem. Commit the PEM bundle to the kayobe configuration.
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/kolla/certificates/haproxy.pem
Or if environments are being used
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/certificates/haproxy.pem
Create the internal TLS certificates¶
Run the playbook
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/vault-generate-internal-tls.yml
Use ansible-vault to encrypt the PEM bundle in $KAYOBE_CONFIG_PATH/kolla/certificates/haproxy-internal.pem. Commit the PEM bundle and root CA to the kayobe configuration.
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/kolla/certificates/haproxy-internal.pem
Or if environments are being used
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/certificates/haproxy-internal.pem
Create the backend TLS and RabbitMQ TLS certificates¶
Run the playbook
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/vault-generate-backend-tls.yml
Use ansible-vault to encrypt the keys in $KAYOBE_CONFIG_PATH/kolla/certificates/<controller>-key.pem. Commit the certificates and keys to the kayobe configuration.
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/kolla/certificates/<controller>-key.pem
Or if environments are being used
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/certificates/<controller>-key.pem
Certificates deployment¶
Warning
The switch from HTTP to HTTPS during the deployment of internal/backend TLS certificates can temporarily disrupt service availability and necessitates a restart of all services. During this transition, endpoints may become unreachable following the HAProxy restart, persisting until the endpoint catalogue and client have been reconfigured to use HTTPS.
Enable the required TLS variables in kayobe and kolla¶
If using Vault as a CA for the external API, set the following in kayobe-config/etc/kayobe/kolla.yml or if environments are being used etc/kayobe/environments/$KAYOBE_ENVIRONMENT/kolla.yml
# Whether TLS is enabled for the external API endpoints. Default is 'no'. kolla_enable_tls_external: yes
See Tempest CA certificate for information on adding CA certificates to the trust store when running Tempest.
Set the following in kayobe-config/etc/kayobe/kolla.yml or if environments are being used etc/kayobe/environments/$KAYOBE_ENVIRONMENT/kolla.yml
# Whether TLS is enabled for the internal API endpoints. Default is 'no'. kolla_enable_tls_internal: yes
Set the following in etc/kayobe/kolla/globals.yml or if environments are being used etc/kayobe/environments/$KAYOBE_ENVIRONMENT/kolla/globals.yml
# Internal TLS configuration # Copy the self-signed CA into the kolla containers kolla_copy_ca_into_containers: "yes" # Use the following trust store within the container openstack_cacert: "{{ '/etc/pki/tls/certs/ca-bundle.crt' if os_distribution == 'rocky' else '/etc/ssl/certs/ca-certificates.crt' }}" # Backend TLS config # Enable backend TLS kolla_enable_tls_backend: "yes" # If using RabbitMQ TLS: rabbitmq_enable_tls: "yes"
Deploy OpenStack
Warning
It is important that you are only using admin endpoints for keystone. If any admin endpoints exist for other services, they must be deleted e.g.
openstack endpoint list --interface admin -f value | \ awk '!/keystone/ {print $1}' | xargs openstack endpoint delete
kayobe overcloud service deploy
If VM provisioning fails with an error with this format:
Unable to establish connection to http://<kolla internal vip/fqdn>:9696/v2.0/ports/some-sort-of-uuid: Connection aborted
Restart the nova-compute container on all hypervisors:
kayobe overcloud host command run --command "systemctl restart kolla-nova_compute-container.service" --become --show-output -l compute
Barbican integration¶
Enable Barbican in kayobe¶
Set the following in kayobe-config/etc/kayobe/kolla.yml or if environments are being used etc/kayobe/environments/$KAYOBE_ENVIRONMENT/kolla.yml
kolla_enable_barbican: yes
Generate secrets_barbican_approle_secret_id¶
Run
uuidgen
to generate secret idInsert into secrets.yml or if environments are being used etc/kayobe/environments/$KAYOBE_ENVIRONMENT/secrets.yml
secrets_barbican_approle_secret_id: "YOUR-SECRET-GOES-HERE"
Create required configuration in Vault¶
Run vault-deploy-barbican.yml custom playbook
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/vault-deploy-barbican.yml
Add secrets_barbican_approle_id to secrets¶
Note the role id from playbook output and insert into secrets.yml or if environments are being used etc/kayobe/environments/$KAYOBE_ENVIRONMENT/secrets.yml
secrets_barbican_approle_role_id: "YOUR-APPROLE-ID-GOES-HERE"
Configure Barbican¶
Put required configuration in kayobe-config/etc/kayobe/kolla/config/barbican.conf or if environments are being used etc/kayobe/environments/$KAYOBE_ENVIRONMENT/kolla/config/barbican.conf
[secretstore] namespace=barbican.secretstore.plugin enable_multiple_secret_stores=false enabled_secretstore_plugins=vault_plugin [vault_plugin] vault_url = https://{{ kolla_internal_vip_address }}:8200 use_ssl = True {% raw %} ssl_ca_crt_file = {{ openstack_cacert }} {% endraw %} approle_role_id = {{ secrets_barbican_approle_role_id }} approle_secret_id = {{ secrets_barbican_approle_secret_id }} kv_mountpoint = barbican
Deploy Barbican¶
kayobe overcloud service deploy -kt barbican