Skip to content

Commit 5843d8d

Browse files
committed
Remove Vault from OG Roundtable
1 parent 98c6a9a commit 5843d8d

File tree

11 files changed

+5
-317
lines changed

11 files changed

+5
-317
lines changed

deployments/security/kustomization.yaml

-1
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,3 @@ kind: Kustomization
44
resources:
55
- resources/cert-manager.yaml
66
- resources/ingress-nginx.yaml
7-
- resources/vault.yaml

deployments/security/resources/vault.yaml

-24
This file was deleted.

deployments/vault/Chart.yaml

-7
This file was deleted.

deployments/vault/README.md

-23
This file was deleted.

deployments/vault/values.yaml

-71
This file was deleted.

docs/app-guide/using-vault-secrets.rst

+4-2
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ These secrets include API keys and tokens that let your application access secur
77
You can't include this information inside your application's code base or GitOps deployment manifests because it would be exposed in our open source GitHub repositories.
88
Instead, you want your application to have these secrets available only when needed: at runtime inside the Roundtable Kubernetes cluster.
99

10-
Applications can use Roundtable's Vault_ service to store and access secrets within Kubernetes.
10+
Applications can use (Phalanx) Roundtable's Vault_ service to store and access secrets within Kubernetes.
1111
By using Vault, Roundtable applications can use a completely public GitOps approach to deployments while ensuring that secret information like passwords and API tokens never leave the Kubernetes cluster.
1212

1313
This page includes an overview of the Vault system along with procedures for using Vault in your application's deployment.
@@ -37,6 +37,8 @@ Read `DMTN-112: LSST DM Vault <https://dmtn-112.lsst.io>`__ for more information
3737
Paths for application secrets
3838
-----------------------------
3939

40+
Note that the following only applies to Original Roundtable. In general, new applications should be using Phalanx, which has `its own method of managing Vault secrets <https://phalanx.lsst.io/developers/helm-chart/define-secrets.html>`__.
41+
4042
Every application stores its secrets at a specific **path** within the Vault service.
4143
Paths keep secrets organized and also helps control access with tokens.
4244

@@ -96,7 +98,7 @@ Get write access to Vault
9698

9799
.. code-block:: bash
98100
99-
export VAULT_ADDR="https://vault.lsst.codes"
101+
export VAULT_ADDR="https://vault.lsst.cloud"
100102
export VAULT_TOKEN=<token id>
101103
102104
.. important::

docs/conf.py

-4
Original file line numberDiff line numberDiff line change
@@ -120,10 +120,6 @@
120120
:target: https://cd.roundtable.lsst.codes/applications/app-land
121121
:alt: App Land app status
122122
123-
.. |vault-status| image:: https://cd.roundtable.lsst.codes/api/badge?name=vault
124-
:target: https://cd.roundtable.lsst.codes/applications/vault
125-
:alt: Vault app status
126-
127123
.. |vault-secrets-operator-status| image:: https://cd.roundtable.lsst.codes/api/badge?name=vault-secrets-operator
128124
:target: https://cd.roundtable.lsst.codes/applications/vault-secrets-operator
129125
:alt: Vault Secrets Operator app status

docs/ops/index.rst

-1
Original file line numberDiff line numberDiff line change
@@ -18,5 +18,4 @@ Although this documentation is openly available, application developers shouldn'
1818
ingress-nginx/index
1919
monitoring/index
2020
strimzi/index
21-
vault/index
2221
vault-secrets-operator/index

docs/ops/ingress-nginx/index.rst

-3
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,6 @@ If the IP address ever changes, at least the following DNS records in AWS Route
4444
- cd.roundtable.lsst.codes
4545
- grpc.cd.roundtable.lsst.codes
4646
- keeper.lsst.codes
47-
- vault.lsst.codes
48-
- vault-1.lsst.codes
49-
- vault-2.lsst.codes
5047

5148
Searching for the old IP address on the Route 53 hosted domain page for lsst.codes is the best way to find any records.
5249
The Route 53 console breaks the records up into multiple pages of results.

docs/ops/security/index.rst

+1-2
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,12 @@ security app deployment guide
1616

1717
.. rubric:: Overview
1818

19-
The ``security`` app is responsible for deploying security services for Roundtable, most notably Vault and all of its dependencies.
19+
The ``security`` app is responsible for deploying security services for Roundtable. Since Vault has moved to Phalanx Roundtable, it doesn't have much to do.
2020
It follows the `app of apps <https://argo-cd.readthedocs.io/en/stable/operator-manual/cluster-bootstrapping/#app-of-apps-pattern>`__ pattern.
2121
It deploys:
2222

2323
- :doc:`ingress-nginx <../ingress-nginx/index>` for shared ingress.
2424
- :doc:`cert-manager <../cert-manager/index>` for Let's-Encrypt-provided TLS certificates.
25-
- :doc:`vault <../vault/index>` for the Vault secret service.
2625

2726
.. rubric:: Bootstrapping the Application
2827

docs/ops/vault/index.rst

-179
This file was deleted.

0 commit comments

Comments
 (0)