docs: Update outdated vaultproject.io/docs/ links (#935)

Signed-off-by: Tanmay Pereira Naik <59953366+tanmay-pnaik@users.noreply.github.com>
This commit is contained in:
Tanmay Pereira Naik 2023-08-23 00:46:41 +05:30 committed by GitHub
parent 1e12d49d74
commit c7353d1aea
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
3 changed files with 15 additions and 15 deletions

View file

@ -10,7 +10,7 @@ cases of Vault on Kubernetes depending on the values provided.
For full documentation on this Helm chart along with all the ways you can For full documentation on this Helm chart along with all the ways you can
use Vault with Kubernetes, please see the use Vault with Kubernetes, please see the
[Vault and Kubernetes documentation](https://www.vaultproject.io/docs/platform/k8s/). [Vault and Kubernetes documentation](https://developer.hashicorp.com/vault/docs/platform/k8s).
## Prerequisites ## Prerequisites
@ -39,5 +39,5 @@ $ helm install vault hashicorp/vault
Please see the many options supported in the `values.yaml` file. These are also Please see the many options supported in the `values.yaml` file. These are also
fully documented directly on the [Vault fully documented directly on the [Vault
website](https://www.vaultproject.io/docs/platform/k8s/helm) along with more website](https://developer.hashicorp.com/vault/docs/platform/k8s/helm) along with more
detailed installation instructions. detailed installation instructions.

View file

@ -4,7 +4,7 @@ Thank you for installing HashiCorp Vault!
Now that you have deployed Vault, you should look over the docs on using Now that you have deployed Vault, you should look over the docs on using
Vault with Kubernetes available here: Vault with Kubernetes available here:
https://www.vaultproject.io/docs/ https://developer.hashicorp.com/vault/docs
Your release is named {{ .Release.Name }}. To learn more about the release, try: Your release is named {{ .Release.Name }}. To learn more about the release, try:

View file

@ -465,7 +465,7 @@ server:
# authDelegator enables a cluster role binding to be attached to the service # authDelegator enables a cluster role binding to be attached to the service
# account. This cluster role binding can be used to setup Kubernetes auth # account. This cluster role binding can be used to setup Kubernetes auth
# method. https://www.vaultproject.io/docs/auth/kubernetes.html # method. See https://developer.hashicorp.com/vault/docs/auth/kubernetes
authDelegator: authDelegator:
enabled: true enabled: true
@ -712,7 +712,7 @@ server:
# This configures the Vault Statefulset to create a PVC for data # This configures the Vault Statefulset to create a PVC for data
# storage when using the file or raft backend storage engines. # storage when using the file or raft backend storage engines.
# See https://www.vaultproject.io/docs/configuration/storage/index.html to know more # See https://developer.hashicorp.com/vault/docs/configuration/storage to know more
dataStorage: dataStorage:
enabled: true enabled: true
# Size of the PVC created # Size of the PVC created
@ -731,7 +731,7 @@ server:
# logs. Once Vault is deployed, initialized, and unsealed, Vault must # logs. Once Vault is deployed, initialized, and unsealed, Vault must
# be configured to use this for audit logs. This will be mounted to # be configured to use this for audit logs. This will be mounted to
# /vault/audit # /vault/audit
# See https://www.vaultproject.io/docs/audit/index.html to know more # See https://developer.hashicorp.com/vault/docs/audit to know more
auditStorage: auditStorage:
enabled: false enabled: false
# Size of the PVC created # Size of the PVC created
@ -750,7 +750,7 @@ server:
# and no initialization. This is useful for experimenting with Vault without # and no initialization. This is useful for experimenting with Vault without
# needing to unseal, store keys, et. al. All data is lost on restart - do not # needing to unseal, store keys, et. al. All data is lost on restart - do not
# use dev mode for anything other than experimenting. # use dev mode for anything other than experimenting.
# See https://www.vaultproject.io/docs/concepts/dev-server.html to know more # See https://developer.hashicorp.com/vault/docs/concepts/dev-server to know more
dev: dev:
enabled: false enabled: false
@ -772,7 +772,7 @@ server:
# Note: Configuration files are stored in ConfigMaps so sensitive data # Note: Configuration files are stored in ConfigMaps so sensitive data
# such as passwords should be either mounted through extraSecretEnvironmentVars # such as passwords should be either mounted through extraSecretEnvironmentVars
# or through a Kube secret. For more information see: # or through a Kube secret. For more information see:
# https://www.vaultproject.io/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations # https://developer.hashicorp.com/vault/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
config: | config: |
ui = true ui = true
@ -815,12 +815,12 @@ server:
replicas: 3 replicas: 3
# Set the api_addr configuration for Vault HA # Set the api_addr configuration for Vault HA
# See https://www.vaultproject.io/docs/configuration#api_addr # See https://developer.hashicorp.com/vault/docs/configuration#api_addr
# If set to null, this will be set to the Pod IP Address # If set to null, this will be set to the Pod IP Address
apiAddr: null apiAddr: null
# Set the cluster_addr confuguration for Vault HA # Set the cluster_addr confuguration for Vault HA
# See https://www.vaultproject.io/docs/configuration#cluster_addr # See https://developer.hashicorp.com/vault/docs/configuration#cluster_addr
# If set to null, this will be set to https://$(HOSTNAME).{{ template "vault.fullname" . }}-internal:8201 # If set to null, this will be set to https://$(HOSTNAME).{{ template "vault.fullname" . }}-internal:8201
clusterAddr: null clusterAddr: null
@ -838,7 +838,7 @@ server:
# Note: Configuration files are stored in ConfigMaps so sensitive data # Note: Configuration files are stored in ConfigMaps so sensitive data
# such as passwords should be either mounted through extraSecretEnvironmentVars # such as passwords should be either mounted through extraSecretEnvironmentVars
# or through a Kube secret. For more information see: # or through a Kube secret. For more information see:
# https://www.vaultproject.io/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations # https://developer.hashicorp.com/vault/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
config: | config: |
ui = true ui = true
@ -865,7 +865,7 @@ server:
# Note: Configuration files are stored in ConfigMaps so sensitive data # Note: Configuration files are stored in ConfigMaps so sensitive data
# such as passwords should be either mounted through extraSecretEnvironmentVars # such as passwords should be either mounted through extraSecretEnvironmentVars
# or through a Kube secret. For more information see: # or through a Kube secret. For more information see:
# https://www.vaultproject.io/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations # https://developer.hashicorp.com/vault/docs/platform/k8s/helm/run#protecting-sensitive-vault-configurations
config: | config: |
ui = true ui = true
@ -1152,7 +1152,7 @@ csi:
debug: false debug: false
# Pass arbitrary additional arguments to vault-csi-provider. # Pass arbitrary additional arguments to vault-csi-provider.
# See https://www.vaultproject.io/docs/platform/k8s/csi/configurations#command-line-arguments # See https://developer.hashicorp.com/vault/docs/platform/k8s/csi/configurations#command-line-arguments
# for the available command line flags. # for the available command line flags.
extraArgs: [] extraArgs: []
@ -1161,8 +1161,8 @@ csi:
# the Vault configuration. There are a few examples included in the `config` sections above. # the Vault configuration. There are a few examples included in the `config` sections above.
# #
# For more information see: # For more information see:
# https://www.vaultproject.io/docs/configuration/telemetry # https://developer.hashicorp.com/vault/docs/configuration/telemetry
# https://www.vaultproject.io/docs/internals/telemetry # https://developer.hashicorp.com/vault/docs/internals/telemetry
serverTelemetry: serverTelemetry:
# Enable support for the Prometheus Operator. Currently, this chart does not support # Enable support for the Prometheus Operator. Currently, this chart does not support
# authenticating to Vault's metrics endpoint, so the following `telemetry{}` must be included # authenticating to Vault's metrics endpoint, so the following `telemetry{}` must be included