Helm chart to easily deploy the Bridgeman Accessible (custom) implementation of the Hashicorp Vault image.
Find a file
Alan Bridgeman 57d15323c9
All checks were successful
Deploy the Helm Chart / build (push) Successful in 10s
Forgot to remove a .vault. (unneccessary root key) from one of the conditionals in a template
2025-12-19 17:21:16 -06:00
.forgejo/workflows Uncommented the helm package and helm push commands given automation seems to be working as expected now 2025-12-19 12:54:16 -06:00
templates Forgot to remove a .vault. (unneccessary root key) from one of the conditionals in a template 2025-12-19 17:21:16 -06:00
.gitignore Added some forgotten housekeeping stuff 2025-12-19 13:03:13 -06:00
.helmignore Added some forgotten housekeeping stuff 2025-12-19 13:03:13 -06:00
Chart.yaml [Forgejo Actions] Update Helm chart version to 1.0.2 2025-12-19 23:11:31 +00:00
LICENSE Added some forgotten housekeeping stuff 2025-12-19 13:03:13 -06:00
README.md Updated chart so that it worked better as a subchart, is more configurable and better documented 2025-12-19 17:11:14 -06:00
values.yaml Updated chart so that it worked better as a subchart, is more configurable and better documented 2025-12-19 17:11:14 -06:00

Customized Hashicorp Vault Implementation - Helm Chart

This repository is meant to hold the helm chart to be able to deploy the customized Hashicorp Vault implementation to a Kubernetes cluster using the Helm software.

Including as a dependency

To use this chart as a dependency:

dependencies:
  - name: ba-custom-hashicorp-vault
    version: 1.0.2
    repository: "https://helm.bridgemanaccessible.ca/"
    alias: passVault
    condition: passVault.enabled

Values (values.yaml)

The following table summarizes the values that can be specified in the values.yaml

Value Name Possible Values Required
type hashicorp / azure Yes
vaultName string No
vaultPort number (ex. 8200) No
clientID string No
clientSecret string No
tenantID string No
create.enabled true / false Yes
create.image.repository string (ex. <redacted-private-repo>/ba-custom-hashicorp-vault) Yes*
create.image.tag latest Yes*
create.ingress.enabled true / false Yes*
create.ingress.host string (ex. vault.<redacted-private-hostname>) Yes**
create.snapshotServer.enabled true / false Yes*
create.snapshotServer.externalPort number (ex. 81) Yes***
create.snapshotServer.internalPort number (ex. 8300) Yes***
create.snapshotServer.vaultCredsPVC.storageClassName string (ex. vault-role-vars-rook-cephfs) Yes***
create.snapshotServer.vaultCredsPVC.size size string (ex. 512Mi) Yes***
create.appRole.roleIDSecretName string (ex. VAULT_ROLE_ID) Yes*
create.appRole.secretIDSecretName string (ex. VAULT_SECRET_ID) Yes*
create.roleVarsPVC.storageClassName string (ex. vault-role-vars-rook-cephfs) Yes*
create.roleVarsPVC.size size string (ex. 512Mi) Yes*
create.vaultData.storageClassName string(ex. rook-ceph-block) Yes*
create.vaultData.accessModes array<ReadWriteOnce> Yes*
create.vaultData.size size string (ex. 2Gi) Yes*

* If create.enabled is true ** If create.ingress.enabled is true *** If creat.snapshotServer.enabled is true