[FOLIO-2641] integrate edge-rtac module with the Vault Created: 10/Jun/20  Updated: 21/Jan/21  Resolved: 20/Jan/21

Status: Closed
Project: FOLIO
Components: None
Affects versions: None
Fix versions: None

Type: Bug Priority: P4
Reporter: Jakub Skoczen Assignee: mark.stacy
Resolution: Done Votes: 0
Labels: devops-backlog
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original estimate: Not Specified

Issue links:
Blocks
is blocked by FOLIO-2580 SPIKE: Use HashiCorp Vault as secret... Closed
Sprint: DevOps: sprint 90, DevOps: Sprint 95, DevOps: Sprint 96, DevOps Sprint 106
Development Team: FOLIO DevOps

 Description   

Edge-rtac was recommended as a simple low-deps module to start with.



 Comments   
Comment by mark.stacy [ 12/Aug/20 ]

John Malconian I add modifications to the `module-kubernetes` that will add Vault integration with module deployment with Vault Secret Store. I added a readme with steps. I did not have time to create roles to generate Institutional users with the correct permissions. The current ansible role defaults to Vault as the Secure Store! This will require manual creating of secret in store. Please see vault-readme: https://github.com/folio-org/folio-ansible/blob/FOLIO-2641/roles/module-kubernetes/vault-readme.md

Comment by Jakub Skoczen [ 05/Nov/20 ]

We discussed that since Mark is working on a similar solution for CU we would benefit from at least having documentation for this feature.

Comment by mark.stacy [ 20/Jan/21 ]

`module-kubernetes` role updated to include the deployment of edge modules. Default edge module is to use Ephemeral secure store with Institutional Users set in the backend module. The role also provides the ability to use Vault secure store. Please see `defaults main.yml.`

Generated at Thu Feb 08 23:22:10 UTC 2024 using Jira 1001.0.0-SNAPSHOT#100246-sha1:7a5c50119eb0633d306e14180817ddef5e80c75d.