You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/vault/v1.20.x/content/docs/deploy/kubernetes/helm/configuration.mdx
+28-6Lines changed: 28 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ and consider if they're appropriate for your deployment.
87
87
88
88
- `repository` (`string: "hashicorp/vault"`) - The name of the Docker image for the Vault Agent sidecar. This should be set to the official Vault Docker image.
89
89
90
-
- `tag` (`string: "1.20.1"`) - The tag of the Vault Docker image to use for the Vault Agent Sidecar. **Vault 1.3.1+ is required by the admission controller**.
90
+
- `tag` (`string: "1.20.4"`) - The tag of the Vault Docker image to use for the Vault Agent Sidecar. **Vault 1.3.1+ is required by the admission controller**.
91
91
92
92
- `agentDefaults`- Values that configure the injected Vault Agent containers default values.
93
93
@@ -351,7 +351,7 @@ and consider if they're appropriate for your deployment.
351
351
352
352
- `repository` (`string: "hashicorp/vault"`) - The name of the Docker image for the containers running Vault.
353
353
354
-
- `tag` (`string: "1.20.1"`) - The tag of the Docker image for the containers running Vault. **This should be pinned to a specific version when running in production.** Otherwise, other changes to the chart may inadvertently upgrade your admission controller.
354
+
- `tag` (`string: "1.20.4"`) - The tag of the Docker image for the containers running Vault. **This should be pinned to a specific version when running in production.** Otherwise, other changes to the chart may inadvertently upgrade your admission controller.
355
355
356
356
- `pullPolicy` (`string: "IfNotPresent"`) - The pull policy for container images. The default pull policy is `IfNotPresent` which causes the Kubelet to skip pulling an image if it already exists.
357
357
@@ -1099,7 +1099,7 @@ and consider if they're appropriate for your deployment.
1099
1099
1100
1100
- `repository` (`string: "hashicorp/vault-csi-provider"`) - The name of the Docker image for the Vault CSI Provider.
1101
1101
1102
-
- `tag` (`string: "1.5.1"`) - The tag of the Docker image for the Vault CSI Provider.. **This should be pinned to a specific version when running in production.** Otherwise, other changes to the chart may inadvertently upgrade your CSI provider.
1102
+
- `tag` (`string: "1.6.0"`) - The tag of the Docker image for the Vault CSI Provider.. **This should be pinned to a specific version when running in production.** Otherwise, other changes to the chart may inadvertently upgrade your CSI provider.
1103
1103
1104
1104
- `pullPolicy` (`string: "IfNotPresent"`) - The pull policy for container images. The default pull policy is `IfNotPresent` which causes the Kubelet to skip pulling an image if it already exists locally.
1105
1105
@@ -1159,11 +1159,11 @@ and consider if they're appropriate for your deployment.
1159
1159
1160
1160
- `extraLabels` (`dictionary: {}`) - This value defines additional labels for the CSI provider daemonset.
1161
1161
1162
-
- `providersDir` (`string: "/etc/kubernetes/secrets-store-csi-providers"`) - Provider host path (must match the CSI provider's path)
1162
+
- `providersDir` (`string: "/var/run/secrets-store-csi-providers"`) - Provider host path (must match the CSI provider's path)
- `securityContext`- Security context for the pod template and container in the csi provider daemonSet
1166
+
- `securityContext` - Security context for the pod template and container in the csi provider daemonSet. If `global.openshift=true`, the container securityContext defaults to `privileged: true`.
1167
1167
1168
1168
- `pod` (`dictionary: {}`) - Pod-level securityContext. May be specified as YAML or a YAML-formatted multi-line templated string.
1169
1169
@@ -1255,7 +1255,7 @@ and consider if they're appropriate for your deployment.
1255
1255
1256
1256
- `repository` (`string: "hashicorp/vault"`) - The name of the Docker image for the Vault Agent sidecar. This should be set to the official Vault Docker image.
1257
1257
1258
-
- `tag` (`string: "1.20.1"`) - The tag of the Vault Docker image to use for the Vault Agent Sidecar.
1258
+
- `tag` (`string: "1.20.4"`) - The tag of the Vault Docker image to use for the Vault Agent Sidecar.
1259
1259
1260
1260
- `logFormat` (`string: "standard"`) -
1261
1261
- `logLevel` (`string: "info"`) -
@@ -1270,6 +1270,20 @@ and consider if they're appropriate for your deployment.
1270
1270
cpu: '250m'
1271
1271
```
1272
1272
1273
+
- `securityContext`
1274
+
- `container` (`dictionary: {}`) - Security context for the Vault Agent sidecar container. Defaults to:
1275
+
1276
+
```yaml
1277
+
allowPrivilegeEscalation: false
1278
+
capabilities:
1279
+
drop:
1280
+
- ALL
1281
+
readOnlyRootFilesystem: true
1282
+
runAsNonRoot: true
1283
+
runAsUser: 100
1284
+
runAsGroup: 1000
1285
+
```
1286
+
1273
1287
- `serverTelemetry`- Values the configure metrics and telemetry. Enabling these features requires setting
1274
1288
the `telemetry {}` stanza in the Vault configuration. See the [telemetry](/vault/docs/configuration/telemetry)
1275
1289
[docs](/vault/docs/internals/telemetry) for more on the Vault configuration.
@@ -1342,6 +1356,14 @@ and consider if they're appropriate for your deployment.
1342
1356
key: token
1343
1357
```
1344
1358
1359
+
- `metricRelabelings` (`array: []`) - Metric relabeling rules to apply to samples before ingestion. See the prometheus [API reference](https://prometheus-operator.dev/docs/api-reference/api/#monitoring.coreos.com/v1.RelabelConfig) for more details. Example:
1360
+
1361
+
```yaml
1362
+
metricRelabelings:
1363
+
- sourceLabels: [cluster]
1364
+
targetLabel: vault_cluster
1365
+
```
1366
+
1345
1367
- `prometheusRules`- Values that configure Prometheus rules.
1346
1368
1347
1369
- `enabled` (`boolean: false`) - Deploy the PrometheusRule custom resource for AlertManager-based
0 commit comments