Skip to content

Instantly share code, notes, and snippets.

@todd-dsm
Created December 13, 2021 21:13
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save todd-dsm/0b9beb6192f1203034f9558d988413dc to your computer and use it in GitHub Desktop.
Save todd-dsm/0b9beb6192f1203034f9558d988413dc to your computer and use it in GitHub Desktop.
vault values REFERENCE
---
global:
enabled: true
psp:
annotations: |
seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default,runtime/default
apparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default
seccomp.security.alpha.kubernetes.io/defaultProfileName: runtime/default
apparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default
enable: false
tlsDisable: true
injector:
agentImage:
repository: vault
tag: "1.5.4"
authPath: auth/kubernetes
enabled: true
externalVaultAddr: ""
image:
pullPolicy: IfNotPresent
repository: hashicorp/vault-k8s
tag: "0.6.0"
logFormat: standard
logLevel: info
metrics:
enabled: false
revokeOnShutdown: false
server:
affinity: |
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchLabels:
app.kubernetes.io/name: {{ template "vault.name" . }}
app.kubernetes.io/instance: "{{ .Release.Name }}"
component: server
topologyKey: kubernetes.io/hostname
auditStorage:
enabled: true
authDelegator:
enabled: true
extraEnvironmentVars: []
extraVolumes: []
ha:
config: ""
disruptionBudget:
enabled: true
maxUnavailable: ~
enabled: true
raft:
config: |
ui = true
listener "tcp" {
tls_disable = 1
address = "[::]:8200"
cluster_address = "[::]:8201"
}
storage "raft" {
path = "/vault/data"
}
service_registration "kubernetes" {}
# Example configuration for using auto-unseal, using AWS KMS
seal "awskms" {
region = "us-east-1"
kms_key_id = "63ca43ee-6f5b-4659-912b-d75fa2635376"
endpoint = ""
}
enabled: true
setNodeId: true
replicas: 3
image:
pullPolicy: IfNotPresent
repository: vault
tag: "1.5.4"
ingress:
annotations:
kubernetes.io/ingress.class: nginx
kubernetes.io/tls-acme: "true"
enabled: true
hosts:
-
host: vault.kubes.lisa.aus.com
paths: []
labels: {}
tls:
-
hosts:
- vault.kubes.lisa.aus.com
secretName: vault-tls
livenessProbe:
enabled: false
initialDelaySeconds: 60
path: /v1/sys/health?standbyok=true
readinessProbe:
enabled: true
service:
config: |
ui = true
listener "tcp" {
tls_disable = 1
address = "[::]:8200"
cluster_address = "[::]:8201"
}
storage "file" {
path = "/vault/data"
}
enabled: true
port: 8200
targetPort: 8200
serviceAccount:
annotations: {}
standalone:
enabled: false
updateStrategyType: OnDelete
ui:
annotations:
external-dns.alpha.kubernetes.io/hostname: vault.lisa.aus.com.
external-dns.alpha.kubernetes.io/ttl: "60"
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: http
service.beta.kubernetes.io/aws-load-balancer-security-policy: ELBSecurityPolicy-TLS-1-2-2017-01
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-east-1:879056827125:certificate/15668081-5705-4e2e-ace0-67200e638b44"
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "443"
enabled: true
externalPort: "443"
serviceNodePort: ~
serviceType: LoadBalancer
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment