vault helm

No introduction found. Create it?

Install

Install with:

helm repo add hashicorp https://helm.releases.hashicorp.com/
helm install vault hashicorp/vault -f values.yaml

Examples

See examples from other people.

Top Repositories (3 out of 9)

NameRepoStarsVersionTimestamp
vaulth3mmy/bloopySphere630.31.012 days ago
vaultqjoly/GitOps990.32.02 months ago
vaultqjoly/GitOps990.32.02 months ago

Values

See the most popular values for this chart:

KeyTypes
boolean
number
string
number
boolean
string
string
string
string
string
string
boolean
server.ingress.hosts[].host (6)
vault.127.0.0.1.nip.io
string
string
server.ingress.tls[].hosts[] (6)
- vault.127.0.0.1.nip.io
string
string
string
string
string
string
string
server.ingress.annotations."forecastle.stakater.com/icon" (2)
https://icon.icepanel.io/Technology/svg/HashiCorp-Vault.svg
string
string
string
string
string
string
boolean
boolean
boolean
server.ha.raft.config (2)
ui = true listener "tcp" { address = "[0.0.0.0]:8200" cluster_address = "[0.0.0.0]:8201" tls_cert_file = "/vault/tls/tls.crt" tls_key_file = "/vault/tls/tls.key" api_addr = "https://vault-active:8200" cluster_addr = "https://vault-active:8201" } seal "awskms" { region = "us-west-2" kms_key_id = "765bd6ab-accb-421f-9ace-b31771c2887e" } storage "raft" { path = "/vault/data" retry_join { leader_api_addr = "https://vault-0.vault-internal:8200" leader_ca_cert_file = "/vault/tls/ca.crt" leader_client_cert_file = "/vault/tls/tls.crt" leader_client_key_file = "/vault/tls/tls.key" } retry_join { leader_api_addr = "https://vault-1.vault-internal:8200" leader_ca_cert_file = "/vault/tls/ca.crt" leader_client_cert_file = "/vault/tls/tls.crt" leader_client_key_file = "/vault/tls/tls.key" } retry_join { leader_api_addr = "https://vault-2.vault-internal:8200" leader_ca_cert_file = "/vault/tls/ca.crt" leader_client_cert_file = "/vault/tls/tls.crt" leader_client_key_file = "/vault/tls/tls.key" } } service_registration "kubernetes" {}
string
boolean
number
string
string
boolean
string
number
string
string
boolean
string
string
string
string
string
string
string
string
string
string
boolean
string
boolean
string
string
server.postStart[] (2)
- /bin/sh
- -c
- /vault/userconfig/init/vault-init.sh
string
boolean
server.readinessProbe.path (2)
/v1/sys/health?standbyok=true&sealedcode=204&uninitcode=204
string
boolean
server.standalone.config (1)
log_format = "json" ui = true cluster_name = "beryjuorg-prod" plugin_directory = "/usr/local/libexec/vault" storage "file" { path = "/vault/data" } # HTTPS listener listener "tcp" { address = "[::]:8200" cluster_address = "[::]:8201" tls_disable = 1 } telemetry { prometheus_retention_time = "24h" disable_hostname = true }
string
string
string
boolean
boolean
server.extraEnvironmentVars.GOOGLE_APPLICATION_CREDENTIALS (1)
/vault/userconfig/kms-vault-unseal/serviceaccount.json
string
string
string
server.extraInitContainers[].args[] (1)
- cd /tmp && wget https://github.com/martinbaillie/vault-plugin-secrets-github/releases/download/v2.1.0/vault-plugin-secrets-github-linux-amd64 && mv vault-plugin-secrets-github-linux-amd64 /usr/local/libexec/vault/secrets-github && chmod +x /usr/local/libexec/vault/secrets-github
string
string
string
string
string
string
string
server.extraSecretEnvironmentVars[].envName (1)
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
string
server.extraSecretEnvironmentVars[].secretKey (1)
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
string
string
string
string
string
server.image.repository (1)
proxy.registry.beryju.io/hashicorp/vault
string
string
boolean
number
server.livenessProbe.path (1)
/v1/sys/health?standbyok=true
string
number
string
boolean
string
boolean
boolean
number
number
string
server.tolerations (1)
- key: "arm" operator: "Exists"
string
boolean
boolean
boolean
boolean
string
string
boolean
boolean