Skip to content

Add TLS Termination options for COS and COS Lite in Terraform #61

@MichaelThamm

Description

@MichaelThamm

Similar to:

We need to implement TLS termination for our TF product modules (COS and COS Lite). References to get you started:

Context

Requirements

  • Determine if we want to update use_tls to be internal_tls and/or external_tls/tls_termination

Issue description

Traefik can receive a cert from config or via relation (we need an identifier accessible by TF to know when traefik has a cert)
- We need a mechanism where Grafana trusts the CA that signed Traefik because we use ingress URL for datasource:

  • Swap Traefik certificates relation with receive-ca-cert: ref.
unit_data grafana/0 grafana-source
{
  "alertmanager/0": {
    "in-scope": true,
    "data": {
      "egress-subnets": "10.152.183.217/32",
      "grafana_source_host": "https://192.168.88.12/tls-alertmanager",
      "ingress-address": "10.152.183.217",
      "private-address": "10.152.183.217"
    }
  }
}
{
  "loki/0": {
    "in-scope": true,
    "data": {
      "egress-subnets": "10.152.183.162/32",
      "grafana_source_host": "https://192.168.88.12/tls-loki-0",
      "ingress-address": "10.152.183.162",
      "private-address": "10.152.183.162"
    }
  }
}
{
  "prometheus/0": {
    "in-scope": true,
    "data": {
      "egress-subnets": "10.152.183.199/32",
      "grafana_source_host": "https://192.168.88.12/tls-prometheus-0",
      "ingress-address": "10.152.183.199",
      "private-address": "10.152.183.199"
    }
  }
}

Metadata

Metadata

Assignees

No one assigned

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions