Created
November 2, 2020 17:22
-
-
Save GuyBarros/792c947e9fe87068bfe654000105f95c to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
global: | |
# enabled is the master enabled switch. Setting this to true or false | |
# will enable or disable all the components within this chart by default. | |
enabled: true | |
# TLS for end-to-end encrypted transport | |
tlsDisable: true | |
# If deploying to OpenShift | |
psp: | |
enable: false | |
# Annotation for PodSecurityPolicy. | |
# This is a multi-line templated string map, and can also be set as YAML. | |
annotations: | | |
seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default,runtime/default | |
apparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default | |
seccomp.security.alpha.kubernetes.io/defaultProfileName: runtime/default | |
apparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default | |
injector: | |
# True if you want to enable vault agent injection. | |
enabled: true | |
# If true, will enable a node exporter metrics endpoint at /metrics. | |
metrics: | |
enabled: false | |
# External vault server address for the injector to use. Setting this will | |
# disable deployment of a vault server along with the injector. | |
externalVaultAddr: "" | |
# image sets the repo and tag of the vault-k8s image to use for the injector. | |
image: | |
repository: "hashicorp/vault-k8s" | |
tag: "0.6.0" | |
pullPolicy: IfNotPresent | |
# agentImage sets the repo and tag of the Vault image to use for the Vault Agent | |
# containers. This should be set to the official Vault image. Vault 1.3.1+ is | |
# required. | |
agentImage: | |
repository: "vault" | |
tag: "1.5.5" | |
# Mount Path of the Vault Kubernetes Auth Method. | |
authPath: "auth/kubernetes" | |
# Configures the log verbosity of the injector. Supported log levels: Trace, Debug, Error, Warn, Info | |
logLevel: "info" | |
# Configures the log format of the injector. Supported log formats: "standard", "json". | |
logFormat: "standard" | |
# Configures all Vault Agent sidecars to revoke their token when shutting down | |
revokeOnShutdown: false | |
# namespaceSelector is the selector for restricting the webhook to only | |
# specific namespaces. | |
# See https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#matching-requests-namespaceselector | |
# for more details. | |
# Example: | |
# namespaceSelector: | |
# matchLabels: | |
# sidecar-injector: enabled | |
namespaceSelector: {} | |
# Configures failurePolicy of the webhook. By default webhook failures are ignored. | |
# To block pod creation while webhook is unavailable, set the policy to `Fail` below. | |
# See https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#failure-policy | |
# | |
# failurePolcy: Fail | |
certs: | |
# secretName is the name of the secret that has the TLS certificate and | |
# private key to serve the injector webhook. If this is null, then the | |
# injector will default to its automatic management mode that will assign | |
# a service account to the injector to generate its own certificates. | |
secretName: null | |
# caBundle is a base64-encoded PEM-encoded certificate bundle for the | |
# CA that signed the TLS certificate that the webhook serves. This must | |
# be set if secretName is non-null. | |
caBundle: "" | |
# certName and keyName are the names of the files within the secret for | |
# the TLS cert and private key, respectively. These have reasonable | |
# defaults but can be customized if necessary. | |
certName: tls.crt | |
keyName: tls.key | |
resources: {} | |
# resources: | |
# requests: | |
# memory: 256Mi | |
# cpu: 250m | |
# limits: | |
# memory: 256Mi | |
# cpu: 250m | |
# extraEnvironmentVars is a list of extra environment variables to set in the | |
# injector deployment. | |
extraEnvironmentVars: {} | |
# KUBERNETES_SERVICE_HOST: kubernetes.default.svc | |
# Affinity Settings for injector pods | |
# This should be a multi-line string matching the affinity section of a | |
# PodSpec. | |
affinity: null | |
# Toleration Settings for injector pods | |
# This should be a multi-line string matching the Toleration array | |
# in a PodSpec. | |
tolerations: null | |
# nodeSelector labels for injector pod assignment, formatted as a muli-line string. | |
# ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector | |
# Example: | |
# nodeSelector: | | |
# beta.kubernetes.io/arch: amd64 | |
nodeSelector: null | |
# Priority class for injector pods | |
priorityClassName: "" | |
# Extra annotations to attach to the injector pods | |
# This can either be YAML or a YAML-formatted multi-line templated string map | |
# of the annotations to apply to the injector pods | |
annotations: {} | |
server: | |
# Resource requests, limits, etc. for the server cluster placement. This | |
# should map directly to the value of the resources field for a PodSpec. | |
# By default no direct resource request is made. | |
image: | |
repository: "hashicorp/vault-enterprise" | |
tag: "1.5.5_ent" | |
# Overrides the default Image Pull Policy | |
pullPolicy: IfNotPresent | |
# Configure the Update Strategy Type for the StatefulSet | |
# See https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies | |
updateStrategyType: "OnDelete" | |
resources: {} | |
# resources: | |
# requests: | |
# memory: 256Mi | |
# cpu: 250m | |
# limits: | |
# memory: 256Mi | |
# cpu: 250m | |
# Ingress allows ingress services to be created to allow external access | |
# from Kubernetes to access Vault pods. | |
# If deployment is on OpenShift, the following block is ignored. | |
# In order to expose the service, use the route section below | |
ingress: | |
enabled: false | |
labels: {} | |
# traffic: external | |
annotations: {} | |
# | | |
# kubernetes.io/ingress.class: nginx | |
# kubernetes.io/tls-acme: "true" | |
# or | |
# kubernetes.io/ingress.class: nginx | |
# kubernetes.io/tls-acme: "true" | |
hosts: | |
- host: chart-example.local | |
paths: [] | |
tls: [] | |
# - secretName: chart-example-tls | |
# hosts: | |
# - chart-example.local | |
# authDelegator enables a cluster role binding to be attached to the service | |
# account. This cluster role binding can be used to setup Kubernetes auth | |
# method. https://www.vaultproject.io/docs/auth/kubernetes.html | |
authDelegator: | |
enabled: true | |
# extraInitContainers is a list of init containers. Specified as a YAML list. | |
# This is useful if you need to run a script to provision TLS certificates or | |
# write out configuration files in a dynamic way. | |
extraInitContainers: null | |
# # This example installs a plugin pulled from github into the /usr/local/libexec/vault/oauthapp folder, | |
# # which is defined in the volumes value. | |
# - name: oauthapp | |
# image: "alpine" | |
# command: [sh, -c] | |
# args: | |
# - cd /tmp && | |
# wget https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/releases/download/v1.2.0/vault-plugin-secrets-oauthapp-v1.2.0-linux-amd64.tar.xz -O oauthapp.xz && | |
# tar -xf oauthapp.xz && | |
# mv vault-plugin-secrets-oauthapp-v1.2.0-linux-amd64 /usr/local/libexec/vault/oauthapp && | |
# chmod +x /usr/local/libexec/vault/oauthapp | |
# volumeMounts: | |
# - name: plugins | |
# mountPath: /usr/local/libexec/vault | |
# extraContainers is a list of sidecar containers. Specified as a YAML list. | |
extraContainers: null | |
# shareProcessNamespace enables process namespace sharing between Vault and the extraContainers | |
# This is useful if Vault must be signaled, e.g. to send a SIGHUP for log rotation | |
shareProcessNamespace: false | |
# extraArgs is a string containing additional Vault server arguments. | |
extraArgs: "" | |
# Used to define custom readinessProbe settings | |
readinessProbe: | |
enabled: true | |
# If you need to use a http path instead of the default exec | |
# path: /v1/sys/health?standbyok=true | |
# When a probe fails, Kubernetes will try failureThreshold times before giving up | |
failureThreshold: 2 | |
# Number of seconds after the container has started before probe initiates | |
initialDelaySeconds: 5 | |
# How often (in seconds) to perform the probe | |
periodSeconds: 5 | |
# Minimum consecutive successes for the probe to be considered successful after having failed | |
successThreshold: 1 | |
# Number of seconds after which the probe times out. | |
timeoutSeconds: 3 | |
# Used to enable a livenessProbe for the pods | |
livenessProbe: | |
enabled: false | |
path: "/v1/sys/health?standbyok=true" | |
# When a probe fails, Kubernetes will try failureThreshold times before giving up | |
failureThreshold: 2 | |
# Number of seconds after the container has started before probe initiates | |
initialDelaySeconds: 60 | |
# How often (in seconds) to perform the probe | |
periodSeconds: 5 | |
# Minimum consecutive successes for the probe to be considered successful after having failed | |
successThreshold: 1 | |
# Number of seconds after which the probe times out. | |
timeoutSeconds: 3 | |
# Used to set the sleep time during the preStop step | |
preStopSleepSeconds: 5 | |
# Used to define commands to run after the pod is ready. | |
# This can be used to automate processes such as initialization | |
# or boostrapping auth methods. | |
postStart: [] | |
# - /bin/sh | |
# - -c | |
# - /vault/userconfig/myscript/run.sh | |
# extraEnvironmentVars is a list of extra environment variables to set with the stateful set. These could be | |
# used to include variables required for auto-unseal. | |
extraEnvironmentVars: {} | |
# GOOGLE_REGION: global | |
# GOOGLE_PROJECT: myproject | |
# GOOGLE_APPLICATION_CREDENTIALS: /vault/userconfig/myproject/myproject-creds.json | |
# extraSecretEnvironmentVars is a list of extra environment variables to set with the stateful set. | |
# These variables take value from existing Secret objects. | |
extraSecretEnvironmentVars: [] | |
# - envName: AWS_SECRET_ACCESS_KEY | |
# secretName: vault | |
# secretKey: AWS_SECRET_ACCESS_KEY | |
# extraVolumes is a list of extra volumes to mount. These will be exposed | |
# to Vault in the path `/vault/userconfig/<name>/`. The value below is | |
# an array of objects, examples are shown below. | |
extraVolumes: [] | |
# - type: secret (or "configMap") | |
# name: my-secret | |
# path: null # default is `/vault/userconfig` | |
# volumes is a list of volumes made available to all containers. These are rendered | |
# via toYaml rather than pre-processed like the extraVolumes value. | |
# The purpose is to make it easy to share volumes between containers. | |
volumes: null | |
# - name: plugins | |
# emptyDir: {} | |
# volumeMounts is a list of volumeMounts for the main server container. These are rendered | |
# via toYaml rather than pre-processed like the extraVolumes value. | |
# The purpose is to make it easy to share volumes between containers. | |
volumeMounts: null | |
# - mountPath: /usr/local/libexec/vault | |
# name: plugins | |
# readOnly: true | |
# Affinity Settings | |
# Commenting out or setting as empty the affinity variable, will allow | |
# deployment to single node services such as Minikube | |
affinity: null | |
# podAntiAffinity: | |
# requiredDuringSchedulingIgnoredDuringExecution: | |
# - labelSelector: | |
# matchLabels: | |
## app.kubernetes.io/name: {{ template "vault.name" . }} | |
# app.kubernetes.io/instance: "{{ .Release.Name }}" | |
# component: server | |
# topologyKey: kubernetes.io/hostname | |
# Toleration Settings for server pods | |
# This should be a multi-line string matching the Toleration array | |
# in a PodSpec. | |
tolerations: null | |
# nodeSelector labels for server pod assignment, formatted as a muli-line string. | |
# ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector | |
# Example: | |
# nodeSelector: | | |
# beta.kubernetes.io/arch: amd64 | |
nodeSelector: null | |
# Enables network policy for server pods | |
networkPolicy: | |
enabled: false | |
# Priority class for server pods | |
priorityClassName: "" | |
# Extra labels to attach to the server pods | |
# This should be a YAML map of the labels to apply to the server pods | |
extraLabels: {} | |
# Extra annotations to attach to the server pods | |
# This can either be YAML or a YAML-formatted multi-line templated string map | |
# of the annotations to apply to the server pods | |
annotations: {} | |
# Enables a headless service to be used by the Vault Statefulset | |
service: | |
enabled: true | |
# clusterIP controls whether a Cluster IP address is attached to the | |
# Vault service within Kubernetes. By default the Vault service will | |
# be given a Cluster IP address, set to None to disable. When disabled | |
# Kubernetes will create a "headless" service. Headless services can be | |
# used to communicate with pods directly through DNS instead of a round robin | |
# load balancer. | |
# clusterIP: None | |
# Configures the service type for the main Vault service. Can be ClusterIP | |
# or NodePort. | |
#type: ClusterIP | |
# If type is set to "NodePort", a specific nodePort value can be configured, | |
# will be random if left blank. | |
#nodePort: 30000 | |
# Port on which Vault server is listening | |
port: 8200 | |
# Target port to which the service should be mapped to | |
targetPort: 8200 | |
# Extra annotations for the service definition. This can either be YAML or a | |
# YAML-formatted multi-line templated string map of the annotations to apply | |
# to the service. | |
annotations: {} | |
# This configures the Vault Statefulset to create a PVC for data | |
# storage when using the file or raft backend storage engines. | |
# See https://www.vaultproject.io/docs/configuration/storage/index.html to know more | |
dataStorage: | |
enabled: true | |
# Size of the PVC created | |
size: 2Gi | |
# Location where the PVC will be mounted. | |
mountPath: "/vault/data" | |
# Name of the storage class to use. If null it will use the | |
# configured default Storage Class. | |
storageClass: null | |
# Access Mode of the storage device being used for the PVC | |
accessMode: ReadWriteOnce | |
# Annotations to apply to the PVC | |
annotations: {} | |
# This configures the Vault Statefulset to create a PVC for audit | |
# logs. Once Vault is deployed, initialized and unseal, Vault must | |
# be configured to use this for audit logs. This will be mounted to | |
# /vault/audit | |
# See https://www.vaultproject.io/docs/audit/index.html to know more | |
auditStorage: | |
enabled: false | |
# Size of the PVC created | |
size: 2Gi | |
# Location where the PVC will be mounted. | |
mountPath: "/vault/audit" | |
# Name of the storage class to use. If null it will use the | |
# configured default Storage Class. | |
storageClass: null | |
# Access Mode of the storage device being used for the PVC | |
accessMode: ReadWriteOnce | |
# Annotations to apply to the PVC | |
annotations: {} | |
# Run Vault in "HA" mode. There are no storage requirements unless audit log | |
# persistence is required. In HA mode Vault will configure itself to use Consul | |
# for its storage backend. The default configuration provided will work the Consul | |
# Helm project by default. It is possible to manually configure Vault to use a | |
# different HA backend. | |
ha: | |
enabled: true | |
replicas: 3 | |
# Set the api_addr configuration for Vault HA | |
# See https://www.vaultproject.io/docs/configuration#api_addr | |
# If set to null, this will be set to the Pod IP Address | |
apiAddr: null | |
# Enables Vault's integrated Raft storage. Unlike the typical HA modes where | |
# Vault's persistence is external (such as Consul), enabling Raft mode will create | |
# persistent volumes for Vault to store data according to the configuration under server.dataStorage. | |
# The Vault cluster will coordinate leader elections and failovers internally. | |
raft: | |
# Enables Raft integrated storage | |
enabled: true | |
# Set the Node Raft ID to the name of the pod | |
setNodeId: true | |
# Note: Configuration files are stored in ConfigMaps so sensitive data | |
# such as passwords should be either mounted through extraSecretEnvironmentVars | |
# or through a Kube secret. For more information see: | |
# https://www.vaultproject.io/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations | |
config: | | |
ui = true | |
listener "tcp" { | |
tls_disable = 1 | |
address = "[::]:8200" | |
cluster_address = "[::]:8201" | |
} | |
storage "raft" { | |
path = "/vault/data" | |
retry_join { | |
leader_api_addr = "http://vault-0.vault-internal:8200" | |
} | |
retry_join { | |
leader_api_addr = "http://vault-1.vault-internal:8200" | |
} | |
retry_join { | |
leader_api_addr = "http://vault-2.vault-internal:8200" | |
} | |
} | |
service_registration "kubernetes" {} | |
# config is a raw string of default configuration when using a Stateful | |
# deployment. Default is to use a Consul for its HA storage backend. | |
# This should be HCL. | |
# A disruption budget limits the number of pods of a replicated application | |
# that are down simultaneously from voluntary disruptions | |
disruptionBudget: | |
enabled: true | |
# maxUnavailable will default to (n/2)-1 where n is the number of | |
# replicas. If you'd like a custom value, you can specify an override here. | |
maxUnavailable: null | |
# Definition of the serviceAccount used to run Vault. | |
# These options are also used when using an external Vault server to validate | |
# Kubernetes tokens. | |
serviceAccount: | |
# Specifies whether a service account should be created | |
create: true | |
# The name of the service account to use. | |
# If not set and create is true, a name is generated using the fullname template | |
name: "" | |
# Extra annotations for the serviceAccount definition. This can either be | |
# YAML or a YAML-formatted multi-line templated string map of the | |
# annotations to apply to the serviceAccount. | |
annotations: {} | |
# Settings for the statefulSet used to run Vault. | |
statefulSet: | |
# Extra annotations for the statefulSet. This can either be YAML or a | |
# YAML-formatted multi-line templated string map of the annotations to apply | |
# to the statefulSet. | |
annotations: {} | |
# Vault UI | |
ui: | |
# True if you want to create a Service entry for the Vault UI. | |
# | |
# serviceType can be used to control the type of service created. For | |
# example, setting this to "LoadBalancer" will create an external load | |
# balancer (for supported K8S installations) to access the UI. | |
enabled: true | |
publishNotReadyAddresses: true | |
# The service should only contain selectors for active Vault pod | |
activeVaultPodOnly: false | |
serviceType: "ClusterIP" | |
serviceNodePort: null | |
externalPort: 8200 | |
# loadBalancerSourceRanges: | |
# - 10.0.0.0/16 | |
# - 1.78.23.3/32 | |
# loadBalancerIP: | |
# Extra annotations to attach to the ui service | |
# This can either be YAML or a YAML-formatted multi-line templated string map | |
# of the annotations to apply to the ui service | |
annotations: {} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment