vault helm

No introduction found. Create it?

Install

Install with:

helm repo add hashicorp https://helm.releases.hashicorp.com/
helm install vault hashicorp/vault -f values.yaml

Examples

See examples from other people.

Top Repositories (3 out of 8)

NameRepoStarsVersionTimestamp
vaulth3mmy/bloopySphere630.31.0a month ago
vaultqjoly/GitOps920.31.02 months ago
vaultqjoly/GitOps920.31.02 months ago

Values

See the most popular values for this chart:

KeyTypes
boolean
string
string
string
string
string
string
boolean
string
number
boolean
boolean
server.ha.raft.config (2)
ui = true listener "tcp" { address = "[0.0.0.0]:8200" cluster_address = "[0.0.0.0]:8201" tls_cert_file = "/vault/tls/tls.crt" tls_key_file = "/vault/tls/tls.key" api_addr = "https://vault-active:8200" cluster_addr = "https://vault-active:8201" } seal "awskms" { region = "us-west-2" kms_key_id = "765bd6ab-accb-421f-9ace-b31771c2887e" } storage "raft" { path = "/vault/data" retry_join { leader_api_addr = "https://vault-0.vault-internal:8200" leader_ca_cert_file = "/vault/tls/ca.crt" leader_client_cert_file = "/vault/tls/tls.crt" leader_client_key_file = "/vault/tls/tls.key" } retry_join { leader_api_addr = "https://vault-1.vault-internal:8200" leader_ca_cert_file = "/vault/tls/ca.crt" leader_client_cert_file = "/vault/tls/tls.crt" leader_client_key_file = "/vault/tls/tls.key" } retry_join { leader_api_addr = "https://vault-2.vault-internal:8200" leader_ca_cert_file = "/vault/tls/ca.crt" leader_client_cert_file = "/vault/tls/tls.crt" leader_client_key_file = "/vault/tls/tls.key" } } service_registration "kubernetes" {}
string
boolean
number
boolean
server.ingress.hosts[].host (5)
vault.127.0.0.1.nip.io
string
string
server.ingress.tls[].hosts[] (5)
- vault.127.0.0.1.nip.io
string
string
string
boolean
string
string
string
string
server.ingress.annotations."forecastle.stakater.com/icon" (2)
https://icon.icepanel.io/Technology/svg/HashiCorp-Vault.svg
string
string
string
string
string
string
string
string
boolean
string
number
string
string
string
string
string
string
string
boolean
string
boolean
string
boolean
string
string
string
string
string
string
server.postStart[] (2)
- /bin/sh
- -c
- /vault/userconfig/init/vault-init.sh
string
boolean
server.readinessProbe.path (2)
/v1/sys/health?standbyok=true&sealedcode=204&uninitcode=204
string
boolean
server.standalone.config (1)
log_format = "json" ui = true cluster_name = "beryjuorg-prod" plugin_directory = "/usr/local/libexec/vault" storage "file" { path = "/vault/data" } # HTTPS listener listener "tcp" { address = "[::]:8200" cluster_address = "[::]:8201" tls_disable = 1 } telemetry { prometheus_retention_time = "24h" disable_hostname = true }
string
string
string
boolean
boolean
server.extraEnvironmentVars.GOOGLE_APPLICATION_CREDENTIALS (1)
/vault/userconfig/kms-vault-unseal/serviceaccount.json
string
string
string
server.extraInitContainers[].args[] (1)
- cd /tmp && wget https://github.com/martinbaillie/vault-plugin-secrets-github/releases/download/v2.1.0/vault-plugin-secrets-github-linux-amd64 && mv vault-plugin-secrets-github-linux-amd64 /usr/local/libexec/vault/secrets-github && chmod +x /usr/local/libexec/vault/secrets-github
string
string
string
string
string
string
string
server.extraSecretEnvironmentVars[].envName (1)
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
string
server.extraSecretEnvironmentVars[].secretKey (1)
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
string
string
string
string
string
server.image.repository (1)
proxy.registry.beryju.io/hashicorp/vault
string
string
boolean
number
server.livenessProbe.path (1)
/v1/sys/health?standbyok=true
string
number
boolean
string
boolean
boolean
number
number
string
server.tolerations (1)
- key: "arm" operator: "Exists"
string
boolean
boolean
string
string
boolean
boolean
boolean
boolean