Created
November 11, 2020 14:05
-
-
Save talalUcef/0ac89e1096fb0e6291cbf7a7a3bb351b to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
injector: | |
# True if you want to enable vault agent injection. | |
enabled: "false" | |
server: | |
# Affinity Settings | |
# Commenting out or setting as empty the affinity variable, will allow | |
# deployment to single node services such as Minikube | |
affinity: null | |
# Run Vault in "standalone" mode. This is the default mode that will deploy if | |
# no arguments are given to helm. This requires a PVC for data storage to use | |
# the "file" backend. This mode is not highly available and should not be scaled | |
# past a single replica. | |
standalone: | |
enabled: "false" | |
# Run Vault in "HA" mode. There are no storage requirements unless audit log | |
# persistence is required. In HA mode Vault will configure itself to use Consul | |
# for its storage backend. The default configuration provided will work the Consul | |
# Helm project by default. It is possible to manually configure Vault to use a | |
# different HA backend. | |
ha: | |
enabled: "true" | |
# config is a raw string of default configuration when using a Stateful | |
# deployment. Default is to use a Consul for its HA storage backend. | |
# This should be HCL. | |
# Note: Configuration files are stored in ConfigMaps so sensitive data | |
# such as passwords should be either mounted through extraSecretEnvironmentVars | |
# or through a Kube secret. For more information see: | |
# https://www.vaultproject.io/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations | |
config: | | |
ui = true | |
listener "tcp" { | |
tls_disable = 1 | |
address = "[::]:8200" | |
cluster_address = "[::]:8201" | |
} | |
storage "postgresql" { | |
connection_url="postgres://postgres:hGDGcMCf06@postgres-release-postgresql.postgres.svc.cluster.local:5432/vaultdb?sslmode=disable" | |
table="vault_kv_store", | |
ha_enabled=true, | |
ha_table="vault_ha_locks" | |
} | |
service_registration "kubernetes" {} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment