diff --git a/website/content/docs/platform/k8s/helm/configuration.mdx b/website/content/docs/platform/k8s/helm/configuration.mdx
index 154ed336b52d..ac3ad1bb7148 100644
--- a/website/content/docs/platform/k8s/helm/configuration.mdx
+++ b/website/content/docs/platform/k8s/helm/configuration.mdx
@@ -73,7 +73,7 @@ and consider if they're appropriate for your deployment.
- `repository` (`string: "hashicorp/vault-k8s"`) - The name of the Docker image for Vault Agent Injector.
- - `tag` (`string: "0.9.0"`) - The tag of the Docker image for the Vault Agent Injector. **This should be pinned to a specific version when running in production.** Otherwise, other changes to the chart may inadvertently upgrade your admission controller.
+ - `tag` (`string: "0.10.0"`) - The tag of the Docker image for the Vault Agent Injector. **This should be pinned to a specific version when running in production.** Otherwise, other changes to the chart may inadvertently upgrade your admission controller.
- `pullPolicy` (`string: "IfNotPresent"`) - The pull policy for container images. The default pull policy is `IfNotPresent` which causes the Kubelet to skip pulling an image if it already exists.
@@ -83,6 +83,19 @@ and consider if they're appropriate for your deployment.
- `tag` (`string: "1.7.0"`) - The tag of the Vault Docker image to use for the Vault Agent Sidecar. **Vault 1.3.1+ is required by the admission controller**.
+- `agentDefaults` - Values that configure the injected Vault Agent containers default values.
+
+ - `cpuLimit` (`string: "500m"`) - The default CPU limit for injected Vault Agent containers.
+
+ - `cpuRequest` (`string: "250m"`) - The default CPU request for injected Vault Agent containers.
+
+ - `memLimit` (`string: "128Mi"`) - The default memory limit for injected Vault Agent containers.
+
+ - `memRequest` (`string: "64Mi"`) - The default memory request for injected Vault Agent containers.
+
+ - `template` (`string: "map"`) - The default template type for rendered secrets if no custom templates are defined.
+ Possible values include `map` and `json`.
+
- `metrics` - Values that configure the Vault Agent Injector metric exporter.
- `enabled` (`boolean: false`) - When set to `true`, the Vault Agent Injector exports Prometheus metrics at the `/metrics` path.
@@ -196,9 +209,15 @@ and consider if they're appropriate for your deployment.
"sample/annotation1": "foo"
"sample/annotation2": "bar"
```
+ - `hostNetwork` (`boolean: false`) - When set to true, configures the Vault Agent Injector to run on the host network. This is useful
+ when alternative cluster networking is used.
+
+ - `port` (`int: 8080`) - Configures the port the Vault Agent Injector listens on.
- `server` - Values that configure running a Vault server within Kubernetes.
+ - `enabled` (`boolean: true`) - When set to `true`, the Vault server will be created.
+
- `image` - Values that configure the Vault Docker image.
- `repository` (`string: "vault"`) - The name of the Docker image for the containers running Vault.
@@ -207,9 +226,15 @@ and consider if they're appropriate for your deployment.
- `pullPolicy` (`string: "IfNotPresent"`) - The pull policy for container images. The default pull policy is `IfNotPresent` which causes the Kubelet to skip pulling an image if it already exists.
- - `updateStrategyType` (`string: "OnDelete"`) - Configure the [Update Strategy Type](https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies) for the StatefulSet.
+ - `updateStrategyType` (`string: "OnDelete"`) - Configure the [Update Strategy Type](https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies) for the StatefulSet.
+
+ - `logLevel` (`string: ""`) - Configures the Vault server logging verbosity. If set this will override values defined in the Vault configuration file.
+ Supported log levels include: `trace`, `debug`, `info`, `warn`, `error`.
- - `resources` (`dictionary: {}`) - The resource requests and limits (CPU, memory, etc.) for each container of the server. This should be a YAML dictionary of a Kubernetes [ResourceRequirements](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.15/#resourcerequirements-v1-core) object. If this isn't specified, then the pods won't request any specific amount of resources, which limits the ability for Kubernetes to make efficient use of compute resources. **Setting this is highly recommended.**
+ - `logFormat` (`string: ""`) - Configures the Vault server logging format. If set this will override values defined in the Vault configuration file.
+ Supported log formats include: `standard`, `json`.
+
+ - `resources` (`dictionary: {}`) - The resource requests and limits (CPU, memory, etc.) for each container of the server. This should be a YAML dictionary of a Kubernetes [ResourceRequirements](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.15/#resourcerequirements-v1-core) object. If this isn't specified, then the pods won't request any specific amount of resources, which limits the ability for Kubernetes to make efficient use of compute resources. **Setting this is highly recommended.**
```yaml
resources:
@@ -219,16 +244,16 @@ and consider if they're appropriate for your deployment.
memory: '10Gi'
```
- * `ingress` - Values that configure Ingress services for Vault.
+ - `ingress` - Values that configure Ingress services for Vault.
- ~> If deploying on OpenShift, these ingress settings are ignored. Use the [`route`](#route) configuration to expose Vault on OpenShift.
+ ~> If deploying on OpenShift, these ingress settings are ignored. Use the [`route`](#route) configuration to expose Vault on OpenShift.
If [`ha`](#ha) is enabled the Ingress will point to the active vault server via the `active` Service. This requires vault 1.4+ and [service_registration](https://www.vaultproject.io/docs/configuration/service-registration/kubernetes) to be set in the vault config.
- - `enabled` (`boolean: false`) - When set to `true`, an [Ingress](https://kubernetes.io/docs/concepts/services-networking/ingress/) service will be created.
+ - `enabled` (`boolean: false`) - When set to `true`, an [Ingress](https://kubernetes.io/docs/concepts/services-networking/ingress/) service will be created.
- - `labels` (`dictionary: {}`) - Labels for the ingress service.
+ - `labels` (`dictionary: {}`) - Labels for the ingress service.
- - `annotations` (`dictionary: {}`) - This value defines additional annotations to
+ - `annotations` (`dictionary: {}`) - This value defines additional annotations to
add to the Ingress service. This can either be YAML or a YAML-formatted
multi-line templated string.
@@ -242,479 +267,490 @@ and consider if they're appropriate for your deployment.
kubernetes.io/tls-acme: "true"
```
- - `hosts` - Values that configure the Ingress host rules.
-
- - `host` (`string: required`): Name of the host to use for Ingress.
-
- - `paths` (`array: []`): A list of paths that will be directed to the Vault service. At least one path is required.
+ - `extraPaths` (`array: {}`) - Configures extra paths to prepend to the host configuration.
+ This is useful when working with annotation based services.
- ```yaml
- paths:
- - /
- - /vault
- ```
-
- * `route` - Values that configure Route services for Vault in OpenShift
-
- ~> If [`ha`](#ha) is enabled the Route will point to the active vault server via the `active` Service (requires vault 1.4+ and [service_registration](https://www.vaultproject.io/docs/configuration/service-registration/kubernetes) to be set in the vault config).
+ ```yaml
+ extraPaths:
+ - path: /*
+ backend:
+ serviceName: ssl-redirect
+ servicePort: use-annotation
+ ```
- - `enabled` (`boolean: false`) - When set to `true`, a Route for Vault will be created.
+ - `hosts` - Values that configure the Ingress host rules.
- - `labels` (`dictionary: {}`) - Labels for the Route
+ - `host` (`string: required`): Name of the host to use for Ingress.
- - `annotations` (`dictionary: {}`) - Annotations to add to the Route. This can either be YAML or a YAML-formatted multi-line templated string.
+ - `paths` (`array: []`): Deprecated: `server.ingress.extraPaths` should be used instead. A list of paths that will be directed to the Vault service. At least one path is required.
- - `host` (`string: "chart-example.local"`) - Sets the hostname for the Route.
+ ```yaml
+ paths:
+ - /
+ - /vault
+ ```
- * `tls` - Values that configure the Ingress TLS rules.
+ - `route` - Values that configure Route services for Vault in OpenShift
- - `hosts` (`array: []`): List of the hosts defined in the Common Name of the TLS Certificate.
+ ~> If [`ha`](#ha) is enabled the Route will point to the active vault server via the `active` Service (requires vault 1.4+ and [service_registration](https://www.vaultproject.io/docs/configuration/service-registration/kubernetes) to be set in the vault config).
- - `secretName` (`string: null`): Name of the secret containing the required TLS files such as certificates and keys.
+ - `enabled` (`boolean: false`) - When set to `true`, a Route for Vault will be created.
- ```yaml
- hosts:
- - sslexample.foo.com
- - sslexample.bar.com
- secretName: testsecret-tls
- ```
+ - `labels` (`dictionary: {}`) - Labels for the Route
- * `authDelegator` - Values that configure the Cluster Role Binding attached to the Vault service account.
+ - `annotations` (`dictionary: {}`) - Annotations to add to the Route. This can either be YAML or a YAML-formatted multi-line templated string.
- - `enabled` (`boolean: true`) - When set to `true`, a Cluster Role Binding will be bound to the Vault service account. This Cluster Role Binding has the necessary privileges for Vault to use the [Kubernetes Auth Method](/docs/auth/kubernetes).
+ - `host` (`string: "chart-example.local"`) - Sets the hostname for the Route.
- * `readinessProbe` - Values that configure the readiness probe for the Vault pods.
+ - `tls` - Values that configure the Ingress TLS rules.
- - `enabled` (`boolean: true`) - When set to `true`, a readiness probe will be applied to the Vault pods.
+ - `hosts` (`array: []`): List of the hosts defined in the Common Name of the TLS Certificate.
- - `path` (`string: ""`) - When set to a value, enables HTTP/HTTPS probes instead of using the default `exec` probe. The http/https scheme is controlled by the `tlsDisable` value.
+ - `secretName` (`string: null`): Name of the secret containing the required TLS files such as certificates and keys.
- - `failureThreshold` (`int: 2`) - When set to a value, configures how many probe failures will be tolerated by Kubernetes.
+ ```yaml
+ hosts:
+ - sslexample.foo.com
+ - sslexample.bar.com
+ secretName: testsecret-tls
+ ```
- - `initialDelaySeconds` (`int: 5`) - When set to a value, configures the number of seconds after the container has started before probe initiates.
+ - `authDelegator` - Values that configure the Cluster Role Binding attached to the Vault service account.
- - `periodSeconds` (`int: 5`) - When set to a value, configures how often (in seconds) to perform the probe.
+ - `enabled` (`boolean: true`) - When set to `true`, a Cluster Role Binding will be bound to the Vault service account. This Cluster Role Binding has the necessary privileges for Vault to use the [Kubernetes Auth Method](/docs/auth/kubernetes).
- - `successThreshold` (`int: 1`) - When set to a value, configures the minimum consecutive successes for the probe to be considered successful after having failed.
+ - `readinessProbe` - Values that configure the readiness probe for the Vault pods.
- - `timeoutSeconds` (`int: 3`) - When set to a value, configures the number of seconds after which the probe times out.
+ - `enabled` (`boolean: true`) - When set to `true`, a readiness probe will be applied to the Vault pods.
- ```yaml
- readinessProbe:
- enabled: true
- path: /v1/sys/health?standbyok=true
- failureThreshold: 2
- initialDelaySeconds: 5
- periodSeconds: 5
- successThreshold: 1
- timeoutSeconds: 3
- ```
+ - `path` (`string: ""`) - When set to a value, enables HTTP/HTTPS probes instead of using the default `exec` probe. The http/https scheme is controlled by the `tlsDisable` value.
- - `livelinessProbes` - Values that configure the liveliness probe for the Vault pods.
+ - `failureThreshold` (`int: 2`) - When set to a value, configures how many probe failures will be tolerated by Kubernetes.
- - `enabled` (`boolean: false`) - When set to `true`, a liveliness probe will be applied to the Vault pods.
+ - `initialDelaySeconds` (`int: 5`) - When set to a value, configures the number of seconds after the container has started before probe initiates.
- - `path` (`string: "/v1/sys/health?standbyok=true"`) - When set to a value, enables HTTP/HTTPS probes instead of using the default `exec` probe. The http/https scheme is controlled by the `tlsDisable` value.
+ - `periodSeconds` (`int: 5`) - When set to a value, configures how often (in seconds) to perform the probe.
- - `initialDelaySeconds` (`int: 60`) - Sets the initial delay of the liveliness probe when the container starts.
+ - `successThreshold` (`int: 1`) - When set to a value, configures the minimum consecutive successes for the probe to be considered successful after having failed.
- - `failureThreshold` (`int: 2`) - When set to a value, configures how many probe failures will be tolerated by Kubernetes.
+ - `timeoutSeconds` (`int: 3`) - When set to a value, configures the number of seconds after which the probe times out.
- - `periodSeconds` (`int: 5`) - When set to a value, configures how often (in seconds) to perform the probe.
+ ```yaml
+ readinessProbe:
+ enabled: true
+ path: /v1/sys/health?standbyok=true
+ failureThreshold: 2
+ initialDelaySeconds: 5
+ periodSeconds: 5
+ successThreshold: 1
+ timeoutSeconds: 3
+ ```
- - `successThreshold` (`int: 1`) - When set to a value, configures the minimum consecutive successes for the probe to be considered successful after having failed.
+ - `livenessProbe` - Values that configure the liveliness probe for the Vault pods.
- - `timeoutSeconds` (`int: 3`) - When set to a value, configures the number of seconds after which the probe times out.
+ - `enabled` (`boolean: false`) - When set to `true`, a liveliness probe will be applied to the Vault pods.
- ```yaml
- livelinessProbe:
- enabled: true
- path: /v1/sys/health?standbyok=true
- initialDelaySeconds: 60
- failureThreshold: 2
- periodSeconds: 5
- successThreshold: 1
- timeoutSeconds: 3
- ```
+ - `path` (`string: "/v1/sys/health?standbyok=true"`) - When set to a value, enables HTTP/HTTPS probes instead of using the default `exec` probe. The http/https scheme is controlled by the `tlsDisable` value.
- - `preStopSleepSeconds` (`int: 5`) - Used to set the sleep time during the preStop step.
+ - `initialDelaySeconds` (`int: 60`) - Sets the initial delay of the liveliness probe when the container starts.
- - `postStart` (`array: []`) - Used to define commands to run after the pod is ready. This can be used to automate processes such as initialization or bootstrapping auth methods.
+ - `failureThreshold` (`int: 2`) - When set to a value, configures how many probe failures will be tolerated by Kubernetes.
- ```yaml
- postStart:
- - /bin/sh
- - -c
- - /vault/userconfig/myscript/run.sh
- ```
+ - `periodSeconds` (`int: 5`) - When set to a value, configures how often (in seconds) to perform the probe.
- - `extraInitContainers` (`array: null`) - extraInitContainers is a list of init containers. Specified as a YAML list. This is useful if you need to run a script to provision TLS certificates or write out configuration files in a dynamic way.
+ - `successThreshold` (`int: 1`) - When set to a value, configures the minimum consecutive successes for the probe to be considered successful after having failed.
- - `extraContainers` (`array: null`) - The extra containers to be applied to the Vault server pods.
+ - `timeoutSeconds` (`int: 3`) - When set to a value, configures the number of seconds after which the probe times out.
```yaml
- extraContainers:
- - name: mycontainer
- image: 'app:0.0.0'
- env: ...
+ livelinessProbe:
+ enabled: true
+ path: /v1/sys/health?standbyok=true
+ initialDelaySeconds: 60
+ failureThreshold: 2
+ periodSeconds: 5
+ successThreshold: 1
+ timeoutSeconds: 3
```
- - `extraEnvironmentVars` (`dictionary: {}`) - The extra environment variables to be applied to the Vault server.
+ - `preStopSleepSeconds` (`int: 5`) - Used to set the sleep time during the preStop step.
- ```yaml
- # Extra Environment Variables are defined as key/value strings.
- extraEnvironmentVars:
- GOOGLE_REGION: global
- GOOGLE_PROJECT: myproject
- GOOGLE_APPLICATION_CREDENTIALS: /vault/userconfig/myproject/myproject-creds.json
- ```
+ - `postStart` (`array: []`) - Used to define commands to run after the pod is ready. This can be used to automate processes such as initialization or bootstrapping auth methods.
- - `shareProcessNamespace` (`boolean: false`) - Enables process namespace sharing between Vault and the extraContainers. This is useful if Vault must be signaled, e.g. to send a SIGHUP for log rotation.
+ ```yaml
+ postStart:
+ - /bin/sh
+ - -c
+ - /vault/userconfig/myscript/run.sh
+ ```
- - `extraArgs` (`string: null`) - The extra arguments to be applied to the Vault server startup command.
+ - `extraInitContainers` (`array: null`) - extraInitContainers is a list of init containers. Specified as a YAML list. This is useful if you need to run a script to provision TLS certificates or write out configuration files in a dynamic way.
- ```yaml
- extraArgs: '-config=/path/to/extra/config.hcl -log-format=json'
- ```
+ - `extraContainers` (`array: null`) - The extra containers to be applied to the Vault server pods.
- - `extraSecretEnvironmentVars` (`string: null`) - The extra environment variables populated from a secret to be applied to the Vault server. This should be a multi-line key/value string.
+ ```yaml
+ extraContainers:
+ - name: mycontainer
+ image: 'app:0.0.0'
+ env: ...
+ ```
- - `envName` (`string: required`) -
- Name of the environment variable to be populated in the Vault container.
+ - `extraEnvironmentVars` (`dictionary: {}`) - The extra environment variables to be applied to the Vault server.
- - `secretName` (`string: required`) -
- Name of Kubernetes secret used to populate the environment variable defined by `envName`.
+ ```yaml
+ # Extra Environment Variables are defined as key/value strings.
+ extraEnvironmentVars:
+ GOOGLE_REGION: global
+ GOOGLE_PROJECT: myproject
+ GOOGLE_APPLICATION_CREDENTIALS: /vault/userconfig/myproject/myproject-creds.json
+ ```
- - `secretKey` (`string: required`) -
- Name of the key where the requested secret value is located in the Kubernetes secret.
+ - `shareProcessNamespace` (`boolean: false`) - Enables process namespace sharing between Vault and the extraContainers. This is useful if Vault must be signaled, e.g. to send a SIGHUP for log rotation.
- ```yaml
- # Extra Environment Variables populated from a secret.
- extraSecretEnvironmentVars:
- - envName: AWS_SECRET_ACCESS_KEY
- secretName: vault
- secretKey: AWS_SECRET_ACCESS_KEY
- ```
+ - `extraArgs` (`string: null`) - The extra arguments to be applied to the Vault server startup command.
- - `extraVolumes` (`array: []`) - Deprecated: please use `volumes` instead. A list of extra volumes to mount to Vault servers. This is useful for bringing in extra data that can be referenced by other configurations at a well known path, such as TLS certificates. The value of this should be a list of objects. Each object supports the following keys:
+ ```yaml
+ extraArgs: '-config=/path/to/extra/config.hcl -log-format=json'
+ ```
- - `type` (`string: required`) -
- Type of the volume, must be one of "configMap" or "secret". Case sensitive.
+ - `extraSecretEnvironmentVars` (`string: null`) - The extra environment variables populated from a secret to be applied to the Vault server. This should be a multi-line key/value string.
- - `name` (`string: required`) -
- Name of the configMap or secret to be mounted. This also controls the path
- that it is mounted to. The volume will be mounted to `/vault/userconfig/` by default
- unless `path` is configured.
+ - `envName` (`string: required`) -
+ Name of the environment variable to be populated in the Vault container.
- - `path` (`string: /vault/userconfigs`) -
- Name of the path where a configMap or secret is mounted. If not specified
- the volume will be mounted to `/vault/userconfig/`.
+ - `secretName` (`string: required`) -
+ Name of Kubernetes secret used to populate the environment variable defined by `envName`.
- - `defaultMode` (`string: "420"`) -
- Default mode of the mounted files.
+ - `secretKey` (`string: required`) -
+ Name of the key where the requested secret value is located in the Kubernetes secret.
- ```yaml
- extraVolumes:
- - type: 'secret'
- name: 'vault-certs'
- path: '/etc/pki'
- ```
+ ```yaml
+ # Extra Environment Variables populated from a secret.
+ extraSecretEnvironmentVars:
+ - envName: AWS_SECRET_ACCESS_KEY
+ secretName: vault
+ secretKey: AWS_SECRET_ACCESS_KEY
+ ```
- - `volumes` (`array: []`) - A list of volumes made available to all containers. This takes
- standard Kubernetes volume definitions.
+ - `extraVolumes` (`array: []`) - Deprecated: please use `volumes` instead. A list of extra volumes to mount to Vault servers. This is useful for bringing in extra data that can be referenced by other configurations at a well known path, such as TLS certificates. The value of this should be a list of objects. Each object supports the following keys:
- ```yaml
- volumes:
- - name: plugins
- emptyDir: {}
- ```
+ - `type` (`string: required`) -
+ Type of the volume, must be one of "configMap" or "secret". Case sensitive.
- - `volumeMounts` (`array: []`) - A list of volumes mounts made available to all containers. This takes
- standard Kubernetes volume definitions.
+ - `name` (`string: required`) -
+ Name of the configMap or secret to be mounted. This also controls the path
+ that it is mounted to. The volume will be mounted to `/vault/userconfig/` by default
+ unless `path` is configured.
- ```yaml
- volumeMounts:
- - mountPath: /usr/local/libexec/vault
- name: plugins
- readOnly: true
- ```
+ - `path` (`string: /vault/userconfigs`) -
+ Name of the path where a configMap or secret is mounted. If not specified
+ the volume will be mounted to `/vault/userconfig/`.
- - `affinity` - This value defines the [affinity](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity) for server pods. It defaults to allowing only a single pod on each node, which minimizes risk of the cluster becoming unusable if a node is lost. If you need to run more pods per node (for example, testing on Minikube), set this value to `null`.
+ - `defaultMode` (`string: "420"`) -
+ Default mode of the mounted files.
```yaml
- # Recommended default server affinity:
- affinity: |
- podAntiAffinity:
- requiredDuringSchedulingIgnoredDuringExecution:
- - labelSelector:
- matchLabels:
- app: {{ template "vault.name" . }}
- release: "{{ .Release.Name }}"
- component: server
- topologyKey: kubernetes.io/hostname
+ extraVolumes:
+ - type: 'secret'
+ name: 'vault-certs'
+ path: '/etc/pki'
```
- - `tolerations` (`string: null`) - This value defines the [tolerations](https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/) that are acceptable when being scheduled. This should be a multi-line string matching the Toleration array in a PodSpec.
+ - `volumes` (`array: []`) - A list of volumes made available to all containers. This takes
+ standard Kubernetes volume definitions.
```yaml
- tolerations: |
- - key: 'node.kubernetes.io/unreachable'
- operator: 'Exists'
- effect: 'NoExecute'
- tolerationSeconds: 6000
+ volumes:
+ - name: plugins
+ emptyDir: {}
```
- - `nodeSelector` - This value defines additional node selection criteria for more control over where the Vault servers are deployed. This should be formatted as a multi-line string.
+ - `volumeMounts` (`array: []`) - A list of volumes mounts made available to all containers. This takes
+ standard Kubernetes volume definitions.
```yaml
- nodeSelector: |
- disktype: ssd
+ volumeMounts:
+ - mountPath: /usr/local/libexec/vault
+ name: plugins
+ readOnly: true
```
- - `networkPolicy` - Values that configure the Vault Network Policy.
+ - `affinity` - This value defines the [affinity](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity) for server pods. It defaults to allowing only a single pod on each node, which minimizes risk of the cluster becoming unusable if a node is lost. If you need to run more pods per node (for example, testing on Minikube), set this value to `null`.
- - `enabled` (`boolean: false`) - When set to `true`, enables a Network Policy for the Vault cluster.
+ ```yaml
+ # Recommended default server affinity:
+ affinity: |
+ podAntiAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ - labelSelector:
+ matchLabels:
+ app: {{ template "vault.name" . }}
+ release: "{{ .Release.Name }}"
+ component: server
+ topologyKey: kubernetes.io/hostname
+ ```
- - `egress` (`array: []`) - This value configures the [egress](https://kubernetes.io/docs/concepts/services-networking/network-policies/) network policy rules.
+ - `tolerations` (`string: null`) - This value defines the [tolerations](https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/) that are acceptable when being scheduled. This should be a multi-line string matching the Toleration array in a PodSpec.
- ```yaml
- egress:
- - to:
- - ipBlock:
- cidr: 10.0.0.0/24
- ports:
- - protocol: TCP
- port: 8200
- ```
+ ```yaml
+ tolerations: |
+ - key: 'node.kubernetes.io/unreachable'
+ operator: 'Exists'
+ effect: 'NoExecute'
+ tolerationSeconds: 6000
+ ```
- - `priorityClassName` (`string: ""`) - Priority class for server pods
+ - `nodeSelector` - This value defines additional node selection criteria for more control over where the Vault servers are deployed. This should be formatted as a multi-line string.
- - `extraLabels` (`dictionary: {}`) - This value defines additional labels for server pods.
+ ```yaml
+ nodeSelector: |
+ disktype: ssd
+ ```
- ```yaml
- extraLabels:
- 'sample/label1': 'foo'
- 'sample/label2': 'bar'
- ```
+ - `networkPolicy` - Values that configure the Vault Network Policy.
+
+ - `enabled` (`boolean: false`) - When set to `true`, enables a Network Policy for the Vault cluster.
- - `annotations` (`dictionary: {}`) - This value defines additional annotations for server pods. This can either be YAML or a YAML-formatted multi-line templated string.
+ - `egress` (`array: []`) - This value configures the [egress](https://kubernetes.io/docs/concepts/services-networking/network-policies/) network policy rules.
```yaml
- annotations:
- "sample/annotation1": "foo"
- "sample/annotation2": "bar"
- # or
- annotations: |
- "sample/annotation1": "foo"
- "sample/annotation2": "bar"
+ egress:
+ - to:
+ - ipBlock:
+ cidr: 10.0.0.0/24
+ ports:
+ - protocol: TCP
+ port: 8200
```
- - `service` - Values that configure the Kubernetes service created for Vault. These options are also used for the `active` and `standby` services when [`ha`](#ha) is enabled.
+ - `priorityClassName` (`string: ""`) - Priority class for server pods
- - `enabled` (`boolean: true`) - When set to `true`, a Kubernetes service will be created for Vault.
+ - `extraLabels` (`dictionary: {}`) - This value defines additional labels for server pods.
- - `clusterIP` (`string`) - ClusterIP controls whether an IP address (cluster IP) is attached to the Vault service within Kubernetes. By default the Vault service will be given a Cluster IP address, set to `None` to disable. When disabled Kubernetes will create a "headless" service. Headless services can be used to communicate with pods directly through DNS instead of a round robin load balancer.
+ ```yaml
+ extraLabels:
+ 'sample/label1': 'foo'
+ 'sample/label2': 'bar'
+ ```
- - `type` (`string: "ClusterIP"`) - Sets the type of service to create, such as `NodePort`.
+ - `annotations` (`dictionary: {}`) - This value defines additional annotations for server pods. This can either be YAML or a YAML-formatted multi-line templated string.
- - `port` (`int: 8200`) - Port on which Vault server is listening inside the pod.
+ ```yaml
+ annotations:
+ "sample/annotation1": "foo"
+ "sample/annotation2": "bar"
+ # or
+ annotations: |
+ "sample/annotation1": "foo"
+ "sample/annotation2": "bar"
+ ```
- - `targetPort` (`int: 8200`) - Port on which the service is listening.
+ - `service` - Values that configure the Kubernetes service created for Vault. These options are also used for the `active` and `standby` services when [`ha`](#ha) is enabled.
- - `nodePort` (`int:`) - When type is set to `NodePort`, the bound node port can be configured using this value. A random port will be assigned if this is left blank.
+ - `enabled` (`boolean: true`) - When set to `true`, a Kubernetes service will be created for Vault.
- - `annotations` (`dictionary: {}`) - This value defines additional annotations for the service. This can either be YAML or a YAML-formatted multi-line templated string.
+ - `clusterIP` (`string`) - ClusterIP controls whether an IP address (cluster IP) is attached to the Vault service within Kubernetes. By default the Vault service will be given a Cluster IP address, set to `None` to disable. When disabled Kubernetes will create a "headless" service. Headless services can be used to communicate with pods directly through DNS instead of a round robin load balancer.
- ```yaml
- annotations:
- "sample/annotation1": "foo"
- "sample/annotation2": "bar"
- # or
- annotations: |
- "sample/annotation1": "foo"
- "sample/annotation2": "bar"
- ```
+ - `type` (`string: "ClusterIP"`) - Sets the type of service to create, such as `NodePort`.
- - `serviceAccount` - Values that configure the Kubernetes service account created for Vault.
+ - `port` (`int: 8200`) - Port on which Vault server is listening inside the pod.
- - `create` (`boolean: true`): If set to true, creates a service account used by Vault.
+ - `targetPort` (`int: 8200`) - Port on which the service is listening.
- - `name` (`string: ""`): Name of the service account to use. If not set and create is true, a name is generated using the name of the installation (default is "vault").
+ - `nodePort` (`int:`) - When type is set to `NodePort`, the bound node port can be configured using this value. A random port will be assigned if this is left blank.
- - `annotations` (`dictionary: {}`) - This value defines additional annotations for the service account. This can either be YAML or a YAML-formatted multi-line templated string.
+ - `annotations` (`dictionary: {}`) - This value defines additional annotations for the service. This can either be YAML or a YAML-formatted multi-line templated string.
- ```yaml
- annotations:
- "sample/annotation1": "foo"
- "sample/annotation2": "bar"
- # or
- annotations: |
- "sample/annotation1": "foo"
- "sample/annotation2": "bar"
- ```
+ ```yaml
+ annotations:
+ "sample/annotation1": "foo"
+ "sample/annotation2": "bar"
+ # or
+ annotations: |
+ "sample/annotation1": "foo"
+ "sample/annotation2": "bar"
+ ```
- - `dataStorage` - This configures the volume used for storing Vault data when not using external storage such as Consul.
+ - `serviceAccount` - Values that configure the Kubernetes service account created for Vault.
- - `enabled` (`boolean: true`) -
- Enables a persistent volume to be created for storing Vault data when not using an external storage service.
+ - `create` (`boolean: true`): If set to true, creates a service account used by Vault.
- - `size` (`string: 10Gi`) -
- Size of the volume to be created for Vault's data storage when not using an external storage service.
+ - `name` (`string: ""`): Name of the service account to use. If not set and create is true, a name is generated using the name of the installation (default is "vault").
- - `storageClass` (`string: null`) -
- Name of the storage class to use when creating the data storage volume.
+ - `annotations` (`dictionary: {}`) - This value defines additional annotations for the service account. This can either be YAML or a YAML-formatted multi-line templated string.
- - `mountPath` (`string: /vault/data`) -
- Configures the path in the Vault pod where the data storage will be mounted.
+ ```yaml
+ annotations:
+ "sample/annotation1": "foo"
+ "sample/annotation2": "bar"
+ # or
+ annotations: |
+ "sample/annotation1": "foo"
+ "sample/annotation2": "bar"
+ ```
- - `accessMode` (`string: ReadWriteOnce`) -
- Type of access mode of the storage device. See the [official Kubernetes](https://kubernetes.io/docs/concepts/storage/persistent-volumes/#access-modes) for more information.
+ - `dataStorage` - This configures the volume used for storing Vault data when not using external storage such as Consul.
- - `annotations` (`dictionary: {}`) - This value defines additional annotations to
- add to the data PVCs. This can either be YAML or a YAML-formatted
- multi-line templated string.
+ - `enabled` (`boolean: true`) -
+ Enables a persistent volume to be created for storing Vault data when not using an external storage service.
- ```yaml
- annotations:
- kubernetes.io/my-pvc: foobar
- # or
- annotations: |
- kubernetes.io/my-pvc: foobar
- ```
+ - `size` (`string: 10Gi`) -
+ Size of the volume to be created for Vault's data storage when not using an external storage service.
- - `auditStorage` - This configures the volume used for storing Vault's audit logs. See the [Vault documentation](/docs/audit) for more information.
+ - `storageClass` (`string: null`) -
+ Name of the storage class to use when creating the data storage volume.
- - `enabled` (`boolean: true`) -
- Enables a persistent volume to be created for storing Vault's audit logs.
+ - `mountPath` (`string: /vault/data`) -
+ Configures the path in the Vault pod where the data storage will be mounted.
- - `size` (`string: 10Gi`) -
- Size of the volume to be created for Vault's audit logs.
+ - `accessMode` (`string: ReadWriteOnce`) -
+ Type of access mode of the storage device. See the [official Kubernetes](https://kubernetes.io/docs/concepts/storage/persistent-volumes/#access-modes) for more information.
- - `storageClass` (`string: null`) -
- Name of the storage class to use when creating the audit storage volume.
+ - `annotations` (`dictionary: {}`) - This value defines additional annotations to
+ add to the data PVCs. This can either be YAML or a YAML-formatted
+ multi-line templated string.
- - `mountPath` (`string: /vault/audit`) -
- Configures the path in the Vault pod where the audit storage will be mounted.
+ ```yaml
+ annotations:
+ kubernetes.io/my-pvc: foobar
+ # or
+ annotations: |
+ kubernetes.io/my-pvc: foobar
+ ```
- - `accessMode` (`string: ReadWriteOnce`) -
- Type of access mode of the storage device.
+ - `auditStorage` - This configures the volume used for storing Vault's audit logs. See the [Vault documentation](/docs/audit) for more information.
- - `annotations` (`dictionary: {}`) - This value defines additional annotations to
- add to the audit PVCs. This can either be YAML or a YAML-formatted
- multi-line templated string.
+ - `enabled` (`boolean: true`) -
+ Enables a persistent volume to be created for storing Vault's audit logs.
- ```yaml
- annotations:
- kubernetes.io/my-pvc: foobar
- # or
- annotations: |
- kubernetes.io/my-pvc: foobar
- ```
+ - `size` (`string: 10Gi`) -
+ Size of the volume to be created for Vault's audit logs.
- - `dev` - This configures `dev` mode for the Vault server.
+ - `storageClass` (`string: null`) -
+ Name of the storage class to use when creating the audit storage volume.
- - `enabled` (`boolean: false`) -
- Enables `dev` mode for the Vault server. This mode is useful for experimenting with Vault without needing to unseal.
+ - `mountPath` (`string: /vault/audit`) -
+ Configures the path in the Vault pod where the audit storage will be mounted.
- - `devRootToken` (`string: "root"`) - Configures the root token for the Vault development server.
+ - `accessMode` (`string: ReadWriteOnce`) -
+ Type of access mode of the storage device.
- ~> **Security Warning:** Never, ever, ever run a "dev" mode server in production. It is insecure and will lose data on every restart (since it stores data in-memory). It is only made for development or experimentation.
+ - `annotations` (`dictionary: {}`) - This value defines additional annotations to
+ add to the audit PVCs. This can either be YAML or a YAML-formatted
+ multi-line templated string.
- - `standalone` - This configures `standalone` mode for the Vault server.
+ ```yaml
+ annotations:
+ kubernetes.io/my-pvc: foobar
+ # or
+ annotations: |
+ kubernetes.io/my-pvc: foobar
+ ```
- - `enabled` (`boolean: true`) -
- Enables `standalone` mode for the Vault server. This mode uses the `file` storage backend and requires a volume for persistence (`dataStorage`).
+ - `dev` - This configures `dev` mode for the Vault server.
- - `config` (`string: "{}"`) -
- A raw string of extra HCL or JSON [configuration](/docs/configuration) for Vault servers.
- This will be saved as-is into a ConfigMap that is read by the Vault servers.
- This can be used to add additional configuration that isn't directly exposed by the chart.
+ - `enabled` (`boolean: false`) -
+ Enables `dev` mode for the Vault server. This mode is useful for experimenting with Vault without needing to unseal.
- ```yaml
- # ExtraConfig values are formatted as a multi-line string:
- config: |
- api_addr = "http://POD_IP:8200"
+ - `devRootToken` (`string: "root"`) - Configures the root token for the Vault development server.
- listener "tcp" {
- tls_disable = 1
- address = "0.0.0.0:8200"
- }
+ ~> **Security Warning:** Never, ever, ever run a "dev" mode server in production. It is insecure and will lose data on every restart (since it stores data in-memory). It is only made for development or experimentation.
- storage "file" {
- path = "/vault/data"
- }
- ```
+ - `standalone` - This configures `standalone` mode for the Vault server.
- This can also be set using Helm's `--set` flag (vault-helm v0.1.0 and later), using the following syntax:
+ - `enabled` (`boolean: true`) -
+ Enables `standalone` mode for the Vault server. This mode uses the `file` storage backend and requires a volume for persistence (`dataStorage`).
- ```shell
- --set server.standalone.config='{ listener "tcp" { address = "0.0.0.0:8200" }'
- ```
+ - `config` (`string: "{}"`) -
+ A raw string of extra HCL or JSON [configuration](/docs/configuration) for Vault servers.
+ This will be saved as-is into a ConfigMap that is read by the Vault servers.
+ This can be used to add additional configuration that isn't directly exposed by the chart.
- - `ha` - This configures `ha` mode for the Vault server.
+ ```yaml
+ # ExtraConfig values are formatted as a multi-line string:
+ config: |
+ api_addr = "http://POD_IP:8200"
+
+ listener "tcp" {
+ tls_disable = 1
+ address = "0.0.0.0:8200"
+ }
+
+ storage "file" {
+ path = "/vault/data"
+ }
+ ```
- - `enabled` (`boolean: false`) -
- Enables `ha` mode for the Vault server. This mode uses a highly available backend storage (such as Consul) to store Vault's data. By default this is configured to use [Consul Helm](https://github.com/hashicorp/consul-helm). For a complete list of storage backends, see the [Vault documentation](/docs/configuration).
+ This can also be set using Helm's `--set` flag (vault-helm v0.1.0 and later), using the following syntax:
- - `apiAddr`: (`string: "{}"`) -
- Set the API address configuration for a Vault cluster. If set to an empty string, the pod IP address is used.
+ ```shell
+ --set server.standalone.config='{ listener "tcp" { address = "0.0.0.0:8200" }'
+ ```
- - `raft` - This configures `raft` integrated storage mode for the Vault server.
+ - `ha` - This configures `ha` mode for the Vault server.
- - `enabled` (`boolean: false`) -
- Enables `raft` integrated storage mode for the Vault server. This mode uses persistent volumes for storage.
+ - `enabled` (`boolean: false`) -
+ Enables `ha` mode for the Vault server. This mode uses a highly available backend storage (such as Consul) to store Vault's data. By default this is configured to use [Consul Helm](https://github.com/hashicorp/consul-helm). For a complete list of storage backends, see the [Vault documentation](/docs/configuration).
- - `setNodeId` (`boolean: false`) - Set the Node Raft ID to the name of the pod.
+ - `apiAddr`: (`string: "{}"`) -
+ Set the API address configuration for a Vault cluster. If set to an empty string, the pod IP address is used.
- - `config` (`string: "{}"`) -
- A raw string of extra HCL or JSON [configuration](/docs/configuration) for Vault servers.
- This will be saved as-is into a ConfigMap that is read by the Vault servers.
- This can be used to add additional configuration that isn't directly exposed by the chart.
+ - `raft` - This configures `raft` integrated storage mode for the Vault server.
- - `replicas` (`int: 5`) -
- The number of pods to deploy to create a highly available cluster of Vault servers.
+ - `enabled` (`boolean: false`) -
+ Enables `raft` integrated storage mode for the Vault server. This mode uses persistent volumes for storage.
- - `updatePartition` (`int: 0`) -
- If an updatePartition is specified, all Pods with an ordinal that is greater than or equal to the partition will be updated when the StatefulSet’s `.spec.template` is updated. If set to `0`, this disables partition updates. For more information see the [official Kubernetes documentation](https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#rolling-updates).
+ - `setNodeId` (`boolean: false`) - Set the Node Raft ID to the name of the pod.
- `config` (`string: "{}"`) -
A raw string of extra HCL or JSON [configuration](/docs/configuration) for Vault servers.
This will be saved as-is into a ConfigMap that is read by the Vault servers.
This can be used to add additional configuration that isn't directly exposed by the chart.
- ```yaml
- # ExtraConfig values are formatted as a multi-line string:
- config: |
- ui = true
- api_addr = "http://POD_IP:8200"
- listener "tcp" {
- tls_disable = 1
- address = "0.0.0.0:8200"
- }
-
- storage "consul" {
- path = "vault"
- address = "HOST_IP:8500"
- }
- ```
+ - `replicas` (`int: 5`) -
+ The number of pods to deploy to create a highly available cluster of Vault servers.
- This can also be set using Helm's `--set` flag (vault-helm v0.1.0 and later), using the following syntax:
+ - `updatePartition` (`int: 0`) -
+ If an updatePartition is specified, all Pods with an ordinal that is greater than or equal to the partition will be updated when the StatefulSet’s `.spec.template` is updated. If set to `0`, this disables partition updates. For more information see the [official Kubernetes documentation](https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#rolling-updates).
- ```shell
- --set server.ha.config='{ listener "tcp" { address = "0.0.0.0:8200" }'
- ```
+ - `config` (`string: "{}"`) -
+ A raw string of extra HCL or JSON [configuration](/docs/configuration) for Vault servers.
+ This will be saved as-is into a ConfigMap that is read by the Vault servers.
+ This can be used to add additional configuration that isn't directly exposed by the chart.
+
+ ```yaml
+ # ExtraConfig values are formatted as a multi-line string:
+ config: |
+ ui = true
+ api_addr = "http://POD_IP:8200"
+ listener "tcp" {
+ tls_disable = 1
+ address = "0.0.0.0:8200"
+ }
+
+ storage "consul" {
+ path = "vault"
+ address = "HOST_IP:8500"
+ }
+ ```
+
+ This can also be set using Helm's `--set` flag (vault-helm v0.1.0 and later), using the following syntax:
+
+ ```shell
+ --set server.ha.config='{ listener "tcp" { address = "0.0.0.0:8200" }'
+ ```
- * `disruptionBudget` - Values that configures the disruption budget policy. See the [official Kubernetes documentation](https://kubernetes.io/docs/tasks/run-application/configure-pdb/) for more information.
+ - `disruptionBudget` - Values that configures the disruption budget policy. See the [official Kubernetes documentation](https://kubernetes.io/docs/tasks/run-application/configure-pdb/) for more information.
- - `enabled` (`boolean: true`) -
- Enables disruption budget policy to limit the number of pods that are down simultaneously from voluntary disruptions.
+ - `enabled` (`boolean: true`) -
+ Enables disruption budget policy to limit the number of pods that are down simultaneously from voluntary disruptions.
- - `maxUnavailable` (`int: null`) -
- The maximum number of unavailable pods. By default, this will be automatically
- computed based on the `server.replicas` value to be `(n/2)-1`. If you need to set
- this to `0`, you will need to add a `--set 'server.disruptionBudget.maxUnavailable=0'`
- flag to the helm chart installation command because of a limitation in the Helm
- templating language.
+ - `maxUnavailable` (`int: null`) -
+ The maximum number of unavailable pods. By default, this will be automatically
+ computed based on the `server.replicas` value to be `(n/2)-1`. If you need to set
+ this to `0`, you will need to add a `--set 'server.disruptionBudget.maxUnavailable=0'`
+ flag to the helm chart installation command because of a limitation in the Helm
+ templating language.
- `statefulset` - This configures settings for the Vault Statefulset.
@@ -781,7 +817,7 @@ and consider if they're appropriate for your deployment.
- `repository` (`string: "hashicorp/vault-csi-provider"`) - The name of the Docker image for the Vault CSI Provider.
- - `tag` (`string: "0.1.0"`) - The tag of the Docker image for the Vault CSI Provider.. **This should be pinned to a specific version when running in production.** Otherwise, other changes to the chart may inadvertently upgrade your CSI provider.
+ - `tag` (`string: "0.2.0"`) - The tag of the Docker image for the Vault CSI Provider.. **This should be pinned to a specific version when running in production.** Otherwise, other changes to the chart may inadvertently upgrade your CSI provider.
- `pullPolicy` (`string: "IfNotPresent"`) - The pull policy for container images. The default pull policy is `IfNotPresent` which causes the Kubelet to skip pulling an image if it already exists locally.
diff --git a/website/content/docs/platform/k8s/helm/examples/enterprise-dr-with-raft.mdx b/website/content/docs/platform/k8s/helm/examples/enterprise-dr-with-raft.mdx
index 120e9a547ac5..c3afb2208028 100644
--- a/website/content/docs/platform/k8s/helm/examples/enterprise-dr-with-raft.mdx
+++ b/website/content/docs/platform/k8s/helm/examples/enterprise-dr-with-raft.mdx
@@ -21,7 +21,7 @@ First, create the primary cluster:
```shell
helm install vault-primary hashicorp/vault \
--set='server.image.repository=hashicorp/vault-enterprise' \
- --set='server.image.tag=1.6.2_ent' \
+ --set='server.image.tag=1.7.0_ent' \
--set='server.ha.enabled=true' \
--set='server.ha.raft.enabled=true'
```
@@ -73,7 +73,7 @@ disaster recovery replication.
```shell
helm install vault-secondary hashicorp/vault \
--set='server.image.repository=hashicorp/vault-enterprise' \
- --set='server.image.tag=1.6.2_ent' \
+ --set='server.image.tag=1.7.0_ent' \
--set='server.ha.enabled=true' \
--set='server.ha.raft.enabled=true'
```
diff --git a/website/content/docs/platform/k8s/helm/examples/enterprise-perf-with-raft.mdx b/website/content/docs/platform/k8s/helm/examples/enterprise-perf-with-raft.mdx
index 4c03d872b74c..91480b198b2a 100644
--- a/website/content/docs/platform/k8s/helm/examples/enterprise-perf-with-raft.mdx
+++ b/website/content/docs/platform/k8s/helm/examples/enterprise-perf-with-raft.mdx
@@ -21,7 +21,7 @@ First, create the primary cluster:
```shell
helm install vault-primary hashicorp/vault \
--set='server.image.repository=hashicorp/vault-enterprise' \
- --set='server.image.tag=1.6.2_ent' \
+ --set='server.image.tag=1.7.0_ent' \
--set='server.ha.enabled=true' \
--set='server.ha.raft.enabled=true'
```
@@ -72,7 +72,7 @@ With the primary cluster created, next create a secondary cluster.
```shell
helm install vault-secondary hashicorp/vault \
--set='server.image.repository=hashicorp/vault-enterprise' \
- --set='server.image.tag=1.6.2_ent' \
+ --set='server.image.tag=1.7.0_ent' \
--set='server.ha.enabled=true' \
--set='server.ha.raft.enabled=true'
```
diff --git a/website/content/docs/platform/k8s/helm/examples/enterprise-with-raft.mdx b/website/content/docs/platform/k8s/helm/examples/enterprise-with-raft.mdx
index db109ecefc12..fa1cb9e62c5a 100644
--- a/website/content/docs/platform/k8s/helm/examples/enterprise-with-raft.mdx
+++ b/website/content/docs/platform/k8s/helm/examples/enterprise-with-raft.mdx
@@ -15,7 +15,7 @@ Integrated storage (raft) can be enabled using the `server.ha.raft.enabled` valu
```shell
helm install vault hashicorp/vault \
--set='server.image.repository=hashicorp/vault-enterprise' \
- --set='server.image.tag=1.6.2_ent' \
+ --set='server.image.tag=1.7.0_ent' \
--set='server.ha.enabled=true' \
--set='server.ha.raft.enabled=true'
```
diff --git a/website/content/docs/platform/k8s/helm/index.mdx b/website/content/docs/platform/k8s/helm/index.mdx
index 52c47dca583f..7f88c286db15 100644
--- a/website/content/docs/platform/k8s/helm/index.mdx
+++ b/website/content/docs/platform/k8s/helm/index.mdx
@@ -35,7 +35,7 @@ $ helm repo add hashicorp https://helm.releases.hashicorp.com
$ helm search repo hashicorp/vault
NAME CHART VERSION APP VERSION DESCRIPTION
-hashicorp/vault 0.10.0 1.7.0 Official HashiCorp Vault Chart
+hashicorp/vault 0.11.0 1.7.0 Official HashiCorp Vault Chart
```
-> **Important:** The Helm chart is new and under significant development.
@@ -57,14 +57,16 @@ Installing a specific version of the chart.
# List the available releases
$ helm search repo hashicorp/vault -l
NAME CHART VERSION APP VERSION DESCRIPTION
-hashicorp/vault 0.10.0 1.7.0 Official HashiCorp Vault Chart
-hashicorp/vault 0.9.1 1.6.2 Official HashiCorp Vault Chart
-hashicorp/vault 0.9.0 1.6.1 Official HashiCorp Vault Chart
-hashicorp/vault 0.8.0 1.5.4 Official HashiCorp Vault Chart
-hashicorp/vault 0.7.0 1.5.2 Official HashiCorp Vault Chart
-
-# Install version 0.10.0
-$ helm install vault hashicorp/vault --version 0.10.0
+hashicorp/vault 0.11.0 1.7.0 Official HashiCorp Vault Chart
+hashicorp/vault 0.10.0 1.7.0 Official HashiCorp Vault Chart
+hashicorp/vault 0.9.1 1.6.2 Official HashiCorp Vault Chart
+hashicorp/vault 0.9.0 1.6.1 Official HashiCorp Vault Chart
+hashicorp/vault 0.8.0 1.5.4 Official HashiCorp Vault Chart
+hashicorp/vault 0.7.0 1.5.2 Official HashiCorp Vault Chart
+hashicorp/vault 0.6.0 1.4.2 Official HashiCorp Vault Chart
+
+# Install version 0.11.0
+$ helm install vault hashicorp/vault --version 0.11.0
```
~> **Security Warning:** By default, the chart runs in standalone mode. This
diff --git a/website/content/docs/platform/k8s/helm/openshift.mdx b/website/content/docs/platform/k8s/helm/openshift.mdx
index 68ec6fae0695..66c6ee27a853 100644
--- a/website/content/docs/platform/k8s/helm/openshift.mdx
+++ b/website/content/docs/platform/k8s/helm/openshift.mdx
@@ -69,7 +69,7 @@ $ helm repo add hashicorp https://helm.releases.hashicorp.com
$ helm search repo hashicorp/vault
NAME CHART VERSION APP VERSION DESCRIPTION
-hashicorp/vault 0.10.0 1.7.0 Official HashiCorp Vault Chart
+hashicorp/vault 0.11.0 1.7.0 Official HashiCorp Vault Chart
```
-> **Important:** The Helm chart is new and under significant development.
@@ -88,14 +88,16 @@ Or install a specific version of the chart.
# List the available releases
$ helm search repo hashicorp/vault -l
NAME CHART VERSION APP VERSION DESCRIPTION
-hashicorp/vault 0.10.0 1.7.0 Official HashiCorp Vault Chart
-hashicorp/vault 0.9.1 1.6.2 Official HashiCorp Vault Chart
-hashicorp/vault 0.9.0 1.6.1 Official HashiCorp Vault Chart
-hashicorp/vault 0.8.0 1.5.4 Official HashiCorp Vault Chart
-hashicorp/vault 0.7.0 1.5.2 Official HashiCorp Vault Chart
-
-# Install version 0.10.0
-$ helm install vault hashicorp/vault --version 0.10.0
+hashicorp/vault 0.11.0 1.7.0 Official HashiCorp Vault Chart
+hashicorp/vault 0.10.0 1.7.0 Official HashiCorp Vault Chart
+hashicorp/vault 0.9.1 1.6.2 Official HashiCorp Vault Chart
+hashicorp/vault 0.9.0 1.6.1 Official HashiCorp Vault Chart
+hashicorp/vault 0.8.0 1.5.4 Official HashiCorp Vault Chart
+hashicorp/vault 0.7.0 1.5.2 Official HashiCorp Vault Chart
+hashicorp/vault 0.6.0 1.4.2 Official HashiCorp Vault Chart
+
+# Install version 0.11.0
+$ helm install vault hashicorp/vault --version 0.11.0
```
The `helm install` command accepts parameters to override default configuration
diff --git a/website/content/docs/platform/k8s/helm/run.mdx b/website/content/docs/platform/k8s/helm/run.mdx
index 5897a71fc2f8..1cace9ccc9e9 100644
--- a/website/content/docs/platform/k8s/helm/run.mdx
+++ b/website/content/docs/platform/k8s/helm/run.mdx
@@ -53,7 +53,7 @@ $ helm repo add hashicorp https://helm.releases.hashicorp.com
$ helm search repo hashicorp/vault
NAME CHART VERSION APP VERSION DESCRIPTION
-hashicorp/vault 0.10.0 1.7.0 Official HashiCorp Vault Chart
+hashicorp/vault 0.11.0 1.7.0 Official HashiCorp Vault Chart
```
-> **Important:** The Helm chart is new and under significant development.
@@ -72,14 +72,16 @@ Or install a specific version of the chart.
# List the available releases
$ helm search repo hashicorp/vault -l
NAME CHART VERSION APP VERSION DESCRIPTION
-hashicorp/vault 0.10.0 1.7.0 Official HashiCorp Vault Chart
-hashicorp/vault 0.9.1 1.6.2 Official HashiCorp Vault Chart
-hashicorp/vault 0.9.0 1.6.1 Official HashiCorp Vault Chart
-hashicorp/vault 0.8.0 1.5.4 Official HashiCorp Vault Chart
-hashicorp/vault 0.7.0 1.5.2 Official HashiCorp Vault Chart
-
-# Install version 0.10.0
-$ helm install vault hashicorp/vault --version 0.10.0
+hashicorp/vault 0.11.0 1.7.0 Official HashiCorp Vault Chart
+hashicorp/vault 0.10.0 1.7.0 Official HashiCorp Vault Chart
+hashicorp/vault 0.9.1 1.6.2 Official HashiCorp Vault Chart
+hashicorp/vault 0.9.0 1.6.1 Official HashiCorp Vault Chart
+hashicorp/vault 0.8.0 1.5.4 Official HashiCorp Vault Chart
+hashicorp/vault 0.7.0 1.5.2 Official HashiCorp Vault Chart
+hashicorp/vault 0.6.0 1.4.2 Official HashiCorp Vault Chart
+
+# Install version 0.11.0
+$ helm install vault hashicorp/vault --version 0.11.0
```
The `helm install` command accepts parameters to override default configuration