No introduction found. Create it?
Install with:
helm repo add hashicorp https://helm.releases.hashicorp.com/
helm install vault hashicorp/vault -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
vault | qjoly/GitOps | 79 | 0.30.0 | 5 months ago |
vault | qjoly/GitOps | 79 | 0.30.0 | 5 months ago |
vault | h3mmy/bloopySphere | 62 | 0.28.1 | a year ago |
See the most popular values for this chart:
Key | Types |
---|---|
injector.enabled (6) false | boolean |
boolean | |
string | |
string | |
ui.enabled (6) true | boolean |
ui.serviceType (3) ClusterIP | string |
number | |
csi.enabled (5) false | boolean |
boolean | |
server.ingress.hosts[].host (5) vault.127.0.0.1.nip.io | string |
string | |
server.ingress.tls[].hosts[] (5) - vault.127.0.0.1.nip.io | string |
server.ingress.tls[].secretName (5) mkcert-tls-secret | string |
string | |
boolean | |
server.ingress.annotations."cert-manager.io/cluster-issuer" (2) letsencrypt-production | string |
string | |
string | |
string | |
server.ingress.annotations."forecastle.stakater.com/icon" (2) https://icon.icepanel.io/Technology/svg/HashiCorp-Vault.svg | string |
string | |
string | |
string | |
server.ingress.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-rfc1918@kubernetescrd | string |
string | |
boolean | |
boolean | |
server.ha.raft.config (1) ui = true
listener "tcp" {
tls_disable = 1
address = "[::]:8200"
cluster_address = "[::]:8201"
}
storage "raft" {
path = "/vault/data"
}
seal "gcpckms" {
project = "${GCP_PROJECT_KEY_0}"
region = "${GCP_VAULT_KMS_REGION}"
key_ring = "${GCP_VAULT_KEYRING_NAME}"
crypto_key = "${GCP_VAULT_CRYPTO_NAME}"
}
service_registration "kubernetes" {}
| string |
boolean | |
number | |
server.volumeMounts[].mountPath (4) /vault/userconfig/init | string |
server.volumeMounts[].name (4) vault-init | string |
boolean | |
server.volumes[].name (4) vault-init | string |
number | |
server.volumes[].configMap.name (2) vault-init | string |
string | |
boolean | |
string | |
server.postStart[] (2) - /bin/sh | string |
string | |
string | |
string | |
string | |
boolean | |
server.standalone.config (1) log_format = "json"
ui = true
cluster_name = "beryjuorg-prod"
plugin_directory = "/usr/local/libexec/vault"
storage "file" {
path = "/vault/data"
}
# HTTPS listener
listener "tcp" {
address = "[::]:8200"
cluster_address = "[::]:8201"
tls_disable = 1
}
telemetry {
prometheus_retention_time = "24h"
disable_hostname = true
}
| string |
boolean | |
string | |
boolean | |
boolean | |
string | |
number | |
number | |
string | |
server.updateStrategyType (2) RollingUpdate | string |
string | |
boolean | |
string | |
boolean | |
string | |
server.dataStorage.storageClass (1) ceph-block | string |
boolean | |
server.extraEnvironmentVars.GOOGLE_APPLICATION_CREDENTIALS (1) /vault/userconfig/kms-vault-unseal/serviceaccount.json | string |
string | |
string | |
server.extraInitContainers[].args[] (1) - cd /tmp && wget https://github.com/martinbaillie/vault-plugin-secrets-github/releases/download/v2.1.0/vault-plugin-secrets-github-linux-amd64 && mv vault-plugin-secrets-github-linux-amd64 /usr/local/libexec/vault/secrets-github && chmod +x /usr/local/libexec/vault/secrets-github | string |
string | |
string | |
server.extraInitContainers[].name (1) github-plugin | string |
server.extraInitContainers[].volumeMounts[].mountPath (1) /usr/local/libexec/vault | string |
string | |
string | |
server.extraVolumes[].name (1) kms-vault-unseal | string |
server.extraVolumes[].path (1) /vault/userconfig | string |
string | |
server.image.repository (1) proxy.registry.beryju.io/hashicorp/vault | string |
server.image.tag (1) 1.20.4 | string |
boolean | |
server.readinessProbe.path (1) /v1/sys/health?standbyok=true&sealedcode=204&uninitcode=204 | string |
server.tolerations (1) - key: "arm"
operator: "Exists"
| string |
boolean | |
string | |
serverTelemetry.serviceMonitor.authorization.credentials.name (1) beryju-io-vault-monitoring | string |
fullnameOverride (1) vault | string |
global.enabled (1) false | boolean |
boolean | |
boolean |