No introduction found. Create it?
Install with:
helm repo add hashicorp-charts https://helm.releases.hashicorp.com/
helm install vault hashicorp-charts/vault -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
vault | qjoly/GitOps | 64 | 0.30.0 | 2 months ago |
vault | qjoly/GitOps | 64 | 0.30.0 | 2 months ago |
vault | h3mmy/bloopySphere | 62 | 0.28.1 | a year ago |
See the most popular values for this chart:
Key | Types |
---|---|
ui.enabled (6) true | boolean |
ui.serviceType (5) ClusterIP | string |
number | |
boolean | |
boolean | |
boolean | |
server.ha.raft.config (2) ui = true
listener "tcp" {
tls_disable = 1
address = "[::]:8200"
cluster_address = "[::]:8201"
}
storage "raft" {
path = "/vault/data"
}
seal "gcpckms" {
project = "${GCP_PROJECT_KEY_0}"
region = "${GCP_VAULT_KMS_REGION}"
key_ring = "${GCP_VAULT_KEYRING_NAME}"
crypto_key = "${GCP_VAULT_CRYPTO_NAME}"
}
service_registration "kubernetes" {}
| string |
number | |
boolean | |
server.dataStorage.storageClass (4) ceph-block | string |
string | |
boolean | |
server.ingress.hosts[].host (3) vault.svc.behn.dev | string |
string | |
string | |
server.ingress.tls[].hosts[] (3) - vault.svc.behn.dev | string |
server.ingress.tls[].secretName (3) behndev-global | string |
boolean | |
server.ingress.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
string | |
string | |
string | |
server.ingress.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-rfc1918@kubernetescrd | string |
string | |
server.ingress.standalone.config (1) log_format = "json"
log_level = "debug"
ui = true
cluster_name = "behndev-prod"
storage "file" {
path = "/vault/data"
}
# HTTPS listener
listener "tcp" {
address = "[::]:8200"
cluster_address = "[::]:8201"
tls_disable = 1
}
telemetry {
prometheus_retention_time = "24h"
disable_hostname = true
}
| string |
boolean | |
boolean | |
server.standalone.config (1) log_format = "json"
ui = true
cluster_name = "beryjuorg-prod"
plugin_directory = "/usr/local/libexec/vault"
storage "file" {
path = "/vault/data"
}
# HTTPS listener
listener "tcp" {
address = "[::]:8200"
cluster_address = "[::]:8201"
tls_disable = 1
}
telemetry {
prometheus_retention_time = "24h"
disable_hostname = true
}
| string |
server.extraEnvironmentVars.TZ (3) ${TIMEZONE} | string |
server.extraEnvironmentVars.GOOGLE_APPLICATION_CREDENTIALS (1) /vault/userconfig/kms-vault-unseal/serviceaccount.json | string |
string | |
string | |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
server.readinessProbe.path (2) /v1/sys/health?standbyok=true&sealedcode=204&uninitcode=204 | string |
server.updateStrategyType (2) RollingUpdate | string |
string | |
boolean | |
string | |
server.auditStorage.storageClass (1) ${STORAGE_CLASS_SSD} | string |
server.extraInitContainers[].args[] (1) - cd /tmp && wget https://github.com/martinbaillie/vault-plugin-secrets-github/releases/download/v2.1.0/vault-plugin-secrets-github-linux-amd64 && mv vault-plugin-secrets-github-linux-amd64 /usr/local/libexec/vault/secrets-github && chmod +x /usr/local/libexec/vault/secrets-github | string |
string | |
string | |
server.extraInitContainers[].name (1) github-plugin | string |
server.extraInitContainers[].volumeMounts[].mountPath (1) /usr/local/libexec/vault | string |
string | |
server.extraVolumes[].name (1) kms-vault-unseal | string |
server.extraVolumes[].path (1) /vault/userconfig | string |
string | |
server.image.repository (1) proxy.registry.beryju.io/hashicorp/vault | string |
server.image.tag (1) 1.20.0 | string |
server.tolerations (1) - key: "arm"
operator: "Exists"
| string |
server.volumeMounts[].mountPath (1) /usr/local/libexec/vault | string |
string | |
boolean | |
server.volumes[].name (1) plugins | string |
csi.enabled (3) false | boolean |
injector.enabled (3) false | string, boolean |
boolean | |
boolean | |
global.enabled (2) false | boolean |
ingress.annotations (1) kubernetes.io/ingress.class: nginx
hajimari.io/enable: "true"
hajimari.io/icon: "bank"
| string |
boolean | |
ingress.hosts[].host (1) vault.${SECRET_DOMAIN} | string |
string | |
ingress.tls[].hosts[] (1) - vault.${SECRET_DOMAIN} | string |
ingress.tls[].secretName (1) vault-tls | string |
string | |
serverTelemetry.serviceMonitor.authorization.credentials.name (1) beryju-io-vault-monitoring | string |
boolean |