This commit is contained in:
2024-08-04 09:33:10 -05:00
parent b1272fc052
commit e0eaa1a96c
72 changed files with 0 additions and 3695 deletions

View File

@@ -1,12 +0,0 @@
apiVersion: v2
name: vault
description: A Helm chart for Kubernetes
type: application
version: 0.0.1
appVersion: 0.0.1
dependencies:
- name: vault
repository: https://helm.releases.hashicorp.com
version: 0.27.0

View File

@@ -1,37 +0,0 @@
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
name: vault-ingress
annotations:
cert-manager.io/cluster-issuer: letsencrypt-production
spec:
entryPoints:
- websecure
routes:
- match: Host(`vault.internal.durp.info`)
middlewares:
- name: whitelist
namespace: traefik
kind: Rule
services:
- name: vault
port: 8200
scheme: http
tls:
secretName: vault-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: vault-tls
spec:
secretName: vault-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "vault.internal.durp.info"
dnsNames:
- "vault.internal.durp.info"

View File

@@ -1,14 +0,0 @@
apiVersion: external-secrets.io/v1beta1
kind: ClusterSecretStore
metadata:
name: vault
spec:
provider:
vault:
server: "http://vault.vault.svc.cluster.local:8200"
path: "secrets"
version: "v2"
auth:
kubernetes:
mountPath: "kubernetes"
role: "external-secrets"

View File

@@ -1,66 +0,0 @@
vault:
global:
image:
repository: "registry.internal.durp.info/hashicorp/vault-k8s"
tag: "1.3.1"
pullPolicy: Always
agentImage:
repository: "registry.internal.durp.info/hashicorp/vault"
tag: "1.15.2"
injector:
enabled: "-"
replicas: 3
leaderElector:
enabled: true
metrics:
enabled: true
image:
repository: "registry.internal.durp.info/hashicorp/vault-k8s"
tag: "1.3.1"
pullPolicy: Always
agentImage:
repository: "registry.internal.durp.info/hashicorp/vault"
tag: "1.15.2"
server:
enabled: "-"
image:
repository: "registry.internal.durp.info/hashicorp/vault"
tag: "1.15.2"
pullPolicy: Always
ha:
enabled: false
replicas: 3
resources: {}
# resources:
# requests:
# memory: 256Mi
# cpu: 250m
# limits:
# memory: 256Mi
# cpu: 250m
dataStorage:
enabled: true
size: 10Gi
storageClass: longhorn
accessMode: ReadWriteOnce
auditStorage:
enabled: false
size: 10Gi
mountPath: "/vault/audit"
storageClass: longhorn
accessMode: ReadWriteOnce
ui:
enabled: false
externalPort: 8200
targetPort: 8200