theshire/kubernetes/apps/security/vault/app/helmrelease.yaml

130 lines
3.8 KiB
YAML
Raw Normal View History

2024-09-10 20:00:42 -05:00
---
# yaml-language-server: $schema=https://raw.githubusercontent.com/fluxcd-community/flux2-schemas/main/helmrelease-helm-v2beta2.json
apiVersion: helm.toolkit.fluxcd.io/v2
kind: HelmRelease
metadata:
name: vault
spec:
interval: 30m
chart:
spec:
chart: vault
version: 0.28.1
sourceRef:
kind: HelmRepository
name: hashicorp
namespace: flux-system
install:
remediation:
retries: 3
upgrade:
cleanupOnFail: true
remediation:
retries: 3
strategy: uninstall
2024-09-10 20:00:42 -05:00
values:
server:
image:
repository: "hashicorp/vault"
tag: "1.17.2"
logLevel: "info"
logFormat: "json"
ingress:
enabled: true
ingressClassName: internal-nginx
hosts:
2024-09-10 20:16:33 -05:00
- host: &host "vault.jahanson.tech"
2024-09-10 21:11:57 -05:00
paths: []
2024-09-10 20:00:42 -05:00
tls:
- hosts:
- *host
service:
type: "ClusterIP"
2024-09-10 21:11:57 -05:00
port: &port 8200
2024-09-10 20:52:52 -05:00
targetPort: *port
2024-09-10 20:00:42 -05:00
# off until it's online for the first time
readinessProbe:
2024-09-10 20:45:05 -05:00
enabled: false
2024-09-10 20:00:42 -05:00
# If you need to use a http path instead of the default exec
# path: /v1/sys/health?standbyok=true
# Port number on which readinessProbe will be checked.
port: *port
2024-09-10 22:47:02 -05:00
extraEnvironmentVars:
2024-09-10 22:49:28 -05:00
VAULT_ADDR: "http://127.0.0.1:8200"
VAULT_API_ADDR: "http://$(POD_IP):8200"
VAULT_CLUSTER_ADDR: "http://$(POD_IP):8201"
2024-09-10 20:00:42 -05:00
# These are defaults but explicitly set here for clarity.
dataStorage:
2024-09-10 22:52:32 -05:00
size: 4Gi
2024-09-10 20:00:42 -05:00
mountPath: /vault/data
storageClass: ceph-block
auditStorage:
enabled: true
size: 10Gi
mountPath: /vault/audit
storageClass: ceph-block
# We want high availability. If standalone is true it sets the storage backend to file
# and the max replicas can only be 1.
standalone:
enabled: false
ha:
enabled: true
# maxUnavailable will default to (n/2)-1 where n is the number of replicas
# so if you have 6 replicas, maxUnavailable will be 2 unless you set it specifically.
replicas: 6
2024-09-10 22:30:53 -05:00
# clusterAddr: "https://vault-active.security.svc.cluster.local:8201"
2024-09-10 20:00:42 -05:00
config: ""
raft:
enabled: true
config: |
ui = true
listener "tcp" {
tls_disable = 1
address = "[::]:8200"
cluster_address = "[::]:8201"
# For prometheus!
telemetry {
unauthenticated_metrics_access = "true"
}
}
storage "raft" {
path = "/vault/data"
2024-09-10 22:47:02 -05:00
retry_join {
auto_join = "provider=k8s label_selector=\"app.kubernetes.io/name=vault,component=server\" namespace=\"security\""
auto_join_scheme = "http"
}
2024-09-10 20:00:42 -05:00
}
2024-09-10 23:15:26 -05:00
seal "kubernetes" {
secret_name = "vault-unseal-keys"
secret_namespace = "security"
key_names = ["key1", "key2", "key3"]
}
2024-09-10 20:00:42 -05:00
service_registration "kubernetes" {}
statefulSet:
securityContext:
pod:
runAsUser: 568
runAsGroup: 568
runAsNonRoot: true
fsGroup: 568
fsGroupChangePolicy: OnRootMismatch
supplementalGroups: [10000]
container:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: false
2024-09-10 20:00:42 -05:00
capabilities:
drop:
- "ALL"
ui:
enabled: true
publishNotReadyAddresses: true
# The service should only contain selectors for active Vault pod
activeVaultPodOnly: true
serviceType: "LoadBalancer"
2024-09-10 20:52:52 -05:00
externalPort: *port
2024-09-10 20:00:42 -05:00
targetPort: *port