DOC: Minor typos fixes (#669)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
This commit is contained in:
parent
eca526b1ce
commit
9fa4c6c322
1 changed files with 8 additions and 8 deletions
16
values.yaml
16
values.yaml
|
@ -101,7 +101,7 @@ injector:
|
||||||
webhook:
|
webhook:
|
||||||
# Configures failurePolicy of the webhook. The "unspecified" default behaviour depends on the
|
# Configures failurePolicy of the webhook. The "unspecified" default behaviour depends on the
|
||||||
# API Version of the WebHook.
|
# API Version of the WebHook.
|
||||||
# To block pod creation while webhook is unavailable, set the policy to `Fail` below.
|
# To block pod creation while the webhook is unavailable, set the policy to `Fail` below.
|
||||||
# See https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#failure-policy
|
# See https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#failure-policy
|
||||||
#
|
#
|
||||||
failurePolicy: Ignore
|
failurePolicy: Ignore
|
||||||
|
@ -192,7 +192,7 @@ injector:
|
||||||
|
|
||||||
# caBundle is a base64-encoded PEM-encoded certificate bundle for the CA
|
# caBundle is a base64-encoded PEM-encoded certificate bundle for the CA
|
||||||
# that signed the TLS certificate that the webhook serves. This must be set
|
# that signed the TLS certificate that the webhook serves. This must be set
|
||||||
# if secretName is non-null, unless an external service like cert-manager is
|
# if secretName is non-null unless an external service like cert-manager is
|
||||||
# keeping the caBundle updated.
|
# keeping the caBundle updated.
|
||||||
caBundle: ""
|
caBundle: ""
|
||||||
|
|
||||||
|
@ -232,7 +232,7 @@ injector:
|
||||||
# KUBERNETES_SERVICE_HOST: kubernetes.default.svc
|
# KUBERNETES_SERVICE_HOST: kubernetes.default.svc
|
||||||
|
|
||||||
# Affinity Settings for injector pods
|
# Affinity Settings for injector pods
|
||||||
# This can either be multi-line string or YAML matching the PodSpec's affinity field.
|
# This can either be a multi-line string or YAML matching the PodSpec's affinity field.
|
||||||
# Commenting out or setting as empty the affinity variable, will allow
|
# Commenting out or setting as empty the affinity variable, will allow
|
||||||
# deployment of multiple replicas to single node services such as Minikube.
|
# deployment of multiple replicas to single node services such as Minikube.
|
||||||
affinity: |
|
affinity: |
|
||||||
|
@ -442,7 +442,7 @@ server:
|
||||||
extraContainers: null
|
extraContainers: null
|
||||||
|
|
||||||
# shareProcessNamespace enables process namespace sharing between Vault and the extraContainers
|
# shareProcessNamespace enables process namespace sharing between Vault and the extraContainers
|
||||||
# This is useful if Vault must be signaled, e.g. to send a SIGHUP for log rotation
|
# This is useful if Vault must be signaled, e.g. to send a SIGHUP for a log rotation
|
||||||
shareProcessNamespace: false
|
shareProcessNamespace: false
|
||||||
|
|
||||||
# extraArgs is a string containing additional Vault server arguments.
|
# extraArgs is a string containing additional Vault server arguments.
|
||||||
|
@ -592,10 +592,10 @@ server:
|
||||||
service:
|
service:
|
||||||
enabled: true
|
enabled: true
|
||||||
# clusterIP controls whether a Cluster IP address is attached to the
|
# clusterIP controls whether a Cluster IP address is attached to the
|
||||||
# Vault service within Kubernetes. By default the Vault service will
|
# Vault service within Kubernetes. By default, the Vault service will
|
||||||
# be given a Cluster IP address, set to None to disable. When disabled
|
# be given a Cluster IP address, set to None to disable. When disabled
|
||||||
# Kubernetes will create a "headless" service. Headless services can be
|
# Kubernetes will create a "headless" service. Headless services can be
|
||||||
# used to communicate with pods directly through DNS instead of a round robin
|
# used to communicate with pods directly through DNS instead of a round-robin
|
||||||
# load balancer.
|
# load balancer.
|
||||||
# clusterIP: None
|
# clusterIP: None
|
||||||
|
|
||||||
|
@ -653,7 +653,7 @@ server:
|
||||||
annotations: {}
|
annotations: {}
|
||||||
|
|
||||||
# This configures the Vault Statefulset to create a PVC for audit
|
# This configures the Vault Statefulset to create a PVC for audit
|
||||||
# logs. Once Vault is deployed, initialized and unsealed, Vault must
|
# logs. Once Vault is deployed, initialized, and unsealed, Vault must
|
||||||
# be configured to use this for audit logs. This will be mounted to
|
# be configured to use this for audit logs. This will be mounted to
|
||||||
# /vault/audit
|
# /vault/audit
|
||||||
# See https://www.vaultproject.io/docs/audit/index.html to know more
|
# See https://www.vaultproject.io/docs/audit/index.html to know more
|
||||||
|
@ -720,7 +720,7 @@ server:
|
||||||
# crypto_key = "vault-helm-unseal-key"
|
# crypto_key = "vault-helm-unseal-key"
|
||||||
#}
|
#}
|
||||||
|
|
||||||
# Run Vault in "HA" mode. There are no storage requirements unless audit log
|
# Run Vault in "HA" mode. There are no storage requirements unless the audit log
|
||||||
# persistence is required. In HA mode Vault will configure itself to use Consul
|
# persistence is required. In HA mode Vault will configure itself to use Consul
|
||||||
# for its storage backend. The default configuration provided will work the Consul
|
# for its storage backend. The default configuration provided will work the Consul
|
||||||
# Helm project by default. It is possible to manually configure Vault to use a
|
# Helm project by default. It is possible to manually configure Vault to use a
|
||||||
|
|
Loading…
Reference in a new issue