-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathvalues.yaml
70 lines (69 loc) · 1.78 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
vaultOperator:
defaults:
apiVersion: "vault.banzaicloud.com/v1alpha1"
bankVaultsImage: ghcr.io/bank-vaults/bank-vaults:latest
# Explicitly set namespace
# or let it pick it up from helm install
# namespace: "vault"
size: 1
version: "1.15.4"
istioEnabled: false
serviceAccount: "vault-sa"
serviceMonitorEnabled: false
serviceRegistrationEnabled: false
serviceType: ClusterIP
statsdDisabled: true
veleroEnabled: false
vaultEnvsConfig:
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: VAULT_K8S_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
vaults: []
# - name: "vault01"
# size: 3
# version: "1.15.4"
# namespace: altvault
# caNamespaces:
# - "*"
#
# vaultEnvsConfig:
# - name: VAULT_LOG
# value: info
#
# credentialsConfig:
# env: env
# path: path
# secretName: secretname
#
# unsealConfig:
# kubernetes:
# secretNamespace: vault
#
# config:
# ui: true
#
# externalConfig:
# policies:
# - name: allow_secrets
# rules: path "secret/*" {
# capabilities = ["create", "read", "update", "delete", "list"]
# }
# auth:
# - type: kubernetes
# roles:
# # Allow every pod in the default namespace to use the secret kv store
# - name: default
# bound_service_account_names: ["default", "vault-secrets-webhook"]
# bound_service_account_namespaces: ["default", "vswh"]
# policies: ["allow_secrets", "allow_pki"]
# ttl: 1h
#
# - name: "vault02"
# version: "1.14.1"
# config:
# blah: blah