clusters/core/addons/vault-kms/values.yaml (66 lines of code) (raw):

vault: fullnameOverride: vault server: standalone: enabled: false ha: enabled: true replicas: 3 raft: enabled: true setNodeId: true # https://github.com/hashicorp/vault/issues/21478 # Vault no longer respects AWS_ROLE_ARN # or AWS_WEB_IDENTITY_TOKEN_FILE for AWS KMS config: | ui = true listener "tcp" { address = "[::]:8200" cluster_address = "[::]:8201" tls_disable = 1 } storage "raft" { path = "/vault/data" retry_join { leader_api_addr = "http://vault-0.vault-internal:8200" } retry_join { leader_api_addr = "http://vault-1.vault-internal:8200" } retry_join { leader_api_addr = "http://vault-2.vault-internal:8200" } } service_registration "kubernetes" {} seal "awskms" { region = "eu-central-1" kms_key_id = "KMS_KEY_ID" role_arn = "arn:aws:iam::012345678910:role/AWSIRSA_Shared_Vault" web_identity_token_file = "/var/run/secrets/eks.amazonaws.com/serviceaccount/token" } serviceAccount: annotations: eks.amazonaws.com/role-arn: arn:aws:iam::012345678910:role/AWSIRSA_Shared_Vault dataStorage: enabled: true size: 1Gi ingress: enabled: true hosts: - host: vault.example.com paths: - / ui: enabled: true job: clusterApiUrl: "https://cluster-api.com" keycloakUrl: "https://keycloak.example.com/auth/realms/shared" vaultUrl: "vault.example.com" # Configuration for setting up resources in Keycloak to enable OIDC authentication. # Prerequisite: Ensure that the Keycloak Operator is installed and integrated with Keycloak. # Refer to the installation guide for the Keycloak Operator: # https://github.com/epam/edp-cluster-add-ons/tree/main/clusters/core/addons/keycloak-operator # # Additionally, necessary Keycloak resources such as realms, roles, and groups must be created # to support component functionality. This can be done using the provided add-ons or manually: # https://github.com/epam/edp-cluster-add-ons/tree/main/clusters/core/addons/kuberocketci-rbac oidc: enabled: false # This section enables configuration for using External Secrets Operator (ESO) as the secret manager. # Prerequisite: Ensure that ESO is installed in the cluster. # Refer to the EDP cluster add-on for ESO installation and setup: # https://github.com/epam/edp-cluster-add-ons/tree/main/clusters/core/addons/external-secrets # # Ensure that you have created the necessary roles for ESO integration. # Follow the detailed instructions here: # https://docs.kuberocketci.io/docs/operator-guide/secrets-management/external-secrets-operator-integration#aws-parameter-store-scenario-in-kuberocketci eso: # -- Install components of the ESO. enabled: true # -- Defines provider type. One of `aws` or `generic`. type: "aws" # -- Defines Secret Store name. secretStoreName: "aws-parameterstore" # -- Value name in AWS ParameterStore, AWS SecretsManager or other Secret Store. secretName: "/infra/core/addons/vault" # -- Role ARN for the ExternalSecretOperator to assume. roleArn: arn:aws:iam::012345678910:role/AWSIRSA_Shared_ExternalSecretOperatorAccess # Defines Secret Store configuration. Used when eso.type is set to "generic". generic: secretStore: # -- Defines SecretStore provider configuration. providerConfig: {} # gcpsm: # projectID: "alphabet-123"