update cert
This commit is contained in:
@@ -11,6 +11,8 @@ vault:
|
|||||||
cpu: 250m
|
cpu: 250m
|
||||||
|
|
||||||
server:
|
server:
|
||||||
|
image:
|
||||||
|
repository: "hashicorp/vault"
|
||||||
# These Resource Limits are in line with node requirements in the
|
# These Resource Limits are in line with node requirements in the
|
||||||
# Vault Reference Architecture for a Small Cluster
|
# Vault Reference Architecture for a Small Cluster
|
||||||
#resources:
|
#resources:
|
||||||
@@ -34,17 +36,18 @@ vault:
|
|||||||
# extraEnvironmentVars is a list of extra environment variables to set with the stateful set. These could be
|
# extraEnvironmentVars is a list of extra environment variables to set with the stateful set. These could be
|
||||||
# used to include variables required for auto-unseal.
|
# used to include variables required for auto-unseal.
|
||||||
extraEnvironmentVars:
|
extraEnvironmentVars:
|
||||||
VAULT_CACERT: /vault/userconfig/tls-ca/ca.crt
|
VAULT_CACERT: /vault/userconfig/vault-server-tls/vault.ca
|
||||||
|
|
||||||
# extraVolumes is a list of extra volumes to mount. These will be exposed
|
volumes:
|
||||||
# to Vault in the path `/vault/userconfig/<name>/`.
|
- name: userconfig-vault-server-tls
|
||||||
extraVolumes:
|
secret:
|
||||||
- type: secret
|
defaultMode: 420
|
||||||
name: tls-server
|
secretName: vault-server-tls
|
||||||
- type: secret
|
|
||||||
name: tls-ca
|
volumeMounts:
|
||||||
- type: secret
|
- mountPath: /vault/userconfig/vault-server-tls
|
||||||
name: kms-creds
|
name: userconfig-vault-server-tls
|
||||||
|
readOnly: true
|
||||||
|
|
||||||
# This configures the Vault Statefulset to create a PVC for audit logs.
|
# This configures the Vault Statefulset to create a PVC for audit logs.
|
||||||
# See https://www.vaultproject.io/docs/audit/index.html to know more
|
# See https://www.vaultproject.io/docs/audit/index.html to know more
|
||||||
@@ -68,23 +71,24 @@ vault:
|
|||||||
listener "tcp" {
|
listener "tcp" {
|
||||||
address = "[::]:8200"
|
address = "[::]:8200"
|
||||||
cluster_address = "[::]:8201"
|
cluster_address = "[::]:8201"
|
||||||
tls_cert_file = "/vault/userconfig/tls-server/tls.crt"
|
tls_cert_file = "/vault/userconfig/vault-server-tls/vault.crt"
|
||||||
tls_key_file = "/vault/userconfig/tls-server/tls.key"
|
tls_key_file = "/vault/userconfig/vault-server-tls/vault.key"
|
||||||
|
tls_client_ca_file = "/vault/userconfig/vault-server-tls/vault.ca"
|
||||||
}
|
}
|
||||||
|
|
||||||
storage "raft" {
|
storage "raft" {
|
||||||
path = "/vault/data"
|
path = "/vault/data"
|
||||||
retry_join {
|
retry_join {
|
||||||
leader_api_addr = "https://vault-0.vault-internal:8200"
|
leader_api_addr = "https://vault-0.vault-internal:8200"
|
||||||
leader_ca_cert_file = "/vault/userconfig/tls-ca/ca.crt"
|
leader_ca_cert_file = "/vault/userconfig/vault-server-tls/vault.ca"
|
||||||
leader_client_cert_file = "/vault/userconfig/tls-server/tls.crt"
|
leader_client_cert_file = "/vault/userconfig/vault-server-tls/vault.crt"
|
||||||
leader_client_key_file = "/vault/userconfig/tls-server/tls.key"
|
leader_client_key_file = "/vault/userconfig/vault-server-tls/vault.ca"
|
||||||
}
|
}
|
||||||
retry_join {
|
retry_join {
|
||||||
leader_api_addr = "https://vault-1.vault-internal:8200"
|
leader_api_addr = "https://vault-1.vault-internal:8200"
|
||||||
leader_ca_cert_file = "/vault/userconfig/tls-ca/ca.crt"
|
leader_ca_cert_file = "/vault/userconfig/vault-server-tls/vault.ca"
|
||||||
leader_client_cert_file = "/vault/userconfig/tls-server/tls.crt"
|
leader_client_cert_file = "/vault/userconfig/vault-server-tls/vault.crt"
|
||||||
leader_client_key_file = "/vault/userconfig/tls-server/tls.key"
|
leader_client_key_file = "/vault/userconfig/vault-server-tls/vault.ca"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user