I’m trying to set up a “reachback” proof of concept; e.g., a k8s consul environment being able to connect microservices in the cloud to an on-prem, traditional database.
I’m working my way through the setup, but need to enable ACLs on the k8s images - and probably make a number of other config changes - in order to proceed through the steps. The filesystem is overlay2 and read-only - is there an elegant/supported way to do this?
Thanks for giving Consul a spin! This tutorial can help you with setting up ACLs as well as other security features when running Consul in K8s. Take a look, and let me know if this gets you where you need to go.
Hi, thanks for the tips - unfortunately, I tried both re-installing from scratch and running the rollout command, and “consul info” on consul-server-0 still shows that ACLs are disabled.
I tried upgrading, re-installing and re-starting the container and ACLs are still disabled - I turned on debugging (attached) during the last install; any insights on what the issue might be?
Note: Helm is pretty particular about versioning; 3.3.0 failed repeatedly; 3.3.1 now “works” (as in helm no longer reports that the install failed).
Thanks - I’ve re-installed, nesting the “acls” section, but am now getting “Permission denied” (code 403) when I attempt to run “consul info” to verify the status of ACLs. Debug info attached.