docs: Update outdated vaultproject.io/docs/ links (#935)
Signed-off-by: Tanmay Pereira Naik <59953366+tanmay-pnaik@users.noreply.github.com>
This commit is contained in:
parent
1e12d49d74
commit
c7353d1aea
3 changed files with 15 additions and 15 deletions
|
@ -10,7 +10,7 @@ cases of Vault on Kubernetes depending on the values provided.
|
||||||
|
|
||||||
For full documentation on this Helm chart along with all the ways you can
|
For full documentation on this Helm chart along with all the ways you can
|
||||||
use Vault with Kubernetes, please see the
|
use Vault with Kubernetes, please see the
|
||||||
[Vault and Kubernetes documentation](https://www.vaultproject.io/docs/platform/k8s/).
|
[Vault and Kubernetes documentation](https://developer.hashicorp.com/vault/docs/platform/k8s).
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
|
@ -39,5 +39,5 @@ $ helm install vault hashicorp/vault
|
||||||
|
|
||||||
Please see the many options supported in the `values.yaml` file. These are also
|
Please see the many options supported in the `values.yaml` file. These are also
|
||||||
fully documented directly on the [Vault
|
fully documented directly on the [Vault
|
||||||
website](https://www.vaultproject.io/docs/platform/k8s/helm) along with more
|
website](https://developer.hashicorp.com/vault/docs/platform/k8s/helm) along with more
|
||||||
detailed installation instructions.
|
detailed installation instructions.
|
||||||
|
|
|
@ -4,7 +4,7 @@ Thank you for installing HashiCorp Vault!
|
||||||
Now that you have deployed Vault, you should look over the docs on using
|
Now that you have deployed Vault, you should look over the docs on using
|
||||||
Vault with Kubernetes available here:
|
Vault with Kubernetes available here:
|
||||||
|
|
||||||
https://www.vaultproject.io/docs/
|
https://developer.hashicorp.com/vault/docs
|
||||||
|
|
||||||
|
|
||||||
Your release is named {{ .Release.Name }}. To learn more about the release, try:
|
Your release is named {{ .Release.Name }}. To learn more about the release, try:
|
||||||
|
|
24
values.yaml
24
values.yaml
|
@ -465,7 +465,7 @@ server:
|
||||||
|
|
||||||
# authDelegator enables a cluster role binding to be attached to the service
|
# authDelegator enables a cluster role binding to be attached to the service
|
||||||
# account. This cluster role binding can be used to setup Kubernetes auth
|
# account. This cluster role binding can be used to setup Kubernetes auth
|
||||||
# method. https://www.vaultproject.io/docs/auth/kubernetes.html
|
# method. See https://developer.hashicorp.com/vault/docs/auth/kubernetes
|
||||||
authDelegator:
|
authDelegator:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
|
||||||
|
@ -712,7 +712,7 @@ server:
|
||||||
|
|
||||||
# This configures the Vault Statefulset to create a PVC for data
|
# This configures the Vault Statefulset to create a PVC for data
|
||||||
# storage when using the file or raft backend storage engines.
|
# storage when using the file or raft backend storage engines.
|
||||||
# See https://www.vaultproject.io/docs/configuration/storage/index.html to know more
|
# See https://developer.hashicorp.com/vault/docs/configuration/storage to know more
|
||||||
dataStorage:
|
dataStorage:
|
||||||
enabled: true
|
enabled: true
|
||||||
# Size of the PVC created
|
# Size of the PVC created
|
||||||
|
@ -731,7 +731,7 @@ server:
|
||||||
# logs. Once Vault is deployed, initialized, and unsealed, Vault must
|
# logs. Once Vault is deployed, initialized, and unsealed, Vault must
|
||||||
# be configured to use this for audit logs. This will be mounted to
|
# be configured to use this for audit logs. This will be mounted to
|
||||||
# /vault/audit
|
# /vault/audit
|
||||||
# See https://www.vaultproject.io/docs/audit/index.html to know more
|
# See https://developer.hashicorp.com/vault/docs/audit to know more
|
||||||
auditStorage:
|
auditStorage:
|
||||||
enabled: false
|
enabled: false
|
||||||
# Size of the PVC created
|
# Size of the PVC created
|
||||||
|
@ -750,7 +750,7 @@ server:
|
||||||
# and no initialization. This is useful for experimenting with Vault without
|
# and no initialization. This is useful for experimenting with Vault without
|
||||||
# needing to unseal, store keys, et. al. All data is lost on restart - do not
|
# needing to unseal, store keys, et. al. All data is lost on restart - do not
|
||||||
# use dev mode for anything other than experimenting.
|
# use dev mode for anything other than experimenting.
|
||||||
# See https://www.vaultproject.io/docs/concepts/dev-server.html to know more
|
# See https://developer.hashicorp.com/vault/docs/concepts/dev-server to know more
|
||||||
dev:
|
dev:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
|
@ -772,7 +772,7 @@ server:
|
||||||
# Note: Configuration files are stored in ConfigMaps so sensitive data
|
# Note: Configuration files are stored in ConfigMaps so sensitive data
|
||||||
# such as passwords should be either mounted through extraSecretEnvironmentVars
|
# such as passwords should be either mounted through extraSecretEnvironmentVars
|
||||||
# or through a Kube secret. For more information see:
|
# or through a Kube secret. For more information see:
|
||||||
# https://www.vaultproject.io/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
|
# https://developer.hashicorp.com/vault/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
|
||||||
config: |
|
config: |
|
||||||
ui = true
|
ui = true
|
||||||
|
|
||||||
|
@ -815,12 +815,12 @@ server:
|
||||||
replicas: 3
|
replicas: 3
|
||||||
|
|
||||||
# Set the api_addr configuration for Vault HA
|
# Set the api_addr configuration for Vault HA
|
||||||
# See https://www.vaultproject.io/docs/configuration#api_addr
|
# See https://developer.hashicorp.com/vault/docs/configuration#api_addr
|
||||||
# If set to null, this will be set to the Pod IP Address
|
# If set to null, this will be set to the Pod IP Address
|
||||||
apiAddr: null
|
apiAddr: null
|
||||||
|
|
||||||
# Set the cluster_addr confuguration for Vault HA
|
# Set the cluster_addr confuguration for Vault HA
|
||||||
# See https://www.vaultproject.io/docs/configuration#cluster_addr
|
# See https://developer.hashicorp.com/vault/docs/configuration#cluster_addr
|
||||||
# If set to null, this will be set to https://$(HOSTNAME).{{ template "vault.fullname" . }}-internal:8201
|
# If set to null, this will be set to https://$(HOSTNAME).{{ template "vault.fullname" . }}-internal:8201
|
||||||
clusterAddr: null
|
clusterAddr: null
|
||||||
|
|
||||||
|
@ -838,7 +838,7 @@ server:
|
||||||
# Note: Configuration files are stored in ConfigMaps so sensitive data
|
# Note: Configuration files are stored in ConfigMaps so sensitive data
|
||||||
# such as passwords should be either mounted through extraSecretEnvironmentVars
|
# such as passwords should be either mounted through extraSecretEnvironmentVars
|
||||||
# or through a Kube secret. For more information see:
|
# or through a Kube secret. For more information see:
|
||||||
# https://www.vaultproject.io/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
|
# https://developer.hashicorp.com/vault/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
|
||||||
config: |
|
config: |
|
||||||
ui = true
|
ui = true
|
||||||
|
|
||||||
|
@ -865,7 +865,7 @@ server:
|
||||||
# Note: Configuration files are stored in ConfigMaps so sensitive data
|
# Note: Configuration files are stored in ConfigMaps so sensitive data
|
||||||
# such as passwords should be either mounted through extraSecretEnvironmentVars
|
# such as passwords should be either mounted through extraSecretEnvironmentVars
|
||||||
# or through a Kube secret. For more information see:
|
# or through a Kube secret. For more information see:
|
||||||
# https://www.vaultproject.io/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
|
# https://developer.hashicorp.com/vault/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
|
||||||
config: |
|
config: |
|
||||||
ui = true
|
ui = true
|
||||||
|
|
||||||
|
@ -1152,7 +1152,7 @@ csi:
|
||||||
debug: false
|
debug: false
|
||||||
|
|
||||||
# Pass arbitrary additional arguments to vault-csi-provider.
|
# Pass arbitrary additional arguments to vault-csi-provider.
|
||||||
# See https://www.vaultproject.io/docs/platform/k8s/csi/configurations#command-line-arguments
|
# See https://developer.hashicorp.com/vault/docs/platform/k8s/csi/configurations#command-line-arguments
|
||||||
# for the available command line flags.
|
# for the available command line flags.
|
||||||
extraArgs: []
|
extraArgs: []
|
||||||
|
|
||||||
|
@ -1161,8 +1161,8 @@ csi:
|
||||||
# the Vault configuration. There are a few examples included in the `config` sections above.
|
# the Vault configuration. There are a few examples included in the `config` sections above.
|
||||||
#
|
#
|
||||||
# For more information see:
|
# For more information see:
|
||||||
# https://www.vaultproject.io/docs/configuration/telemetry
|
# https://developer.hashicorp.com/vault/docs/configuration/telemetry
|
||||||
# https://www.vaultproject.io/docs/internals/telemetry
|
# https://developer.hashicorp.com/vault/docs/internals/telemetry
|
||||||
serverTelemetry:
|
serverTelemetry:
|
||||||
# Enable support for the Prometheus Operator. Currently, this chart does not support
|
# Enable support for the Prometheus Operator. Currently, this chart does not support
|
||||||
# authenticating to Vault's metrics endpoint, so the following `telemetry{}` must be included
|
# authenticating to Vault's metrics endpoint, so the following `telemetry{}` must be included
|
||||||
|
|
Loading…
Reference in a new issue