hashicorp-vault-eks-addon

hashicorp/hashicorp-vault-eks-addon/aws

Terraform Module HCL AWS ⏱ stale 1y 7mo

HashiCorp Vault Add-on for AWS EKS

Install

module "hashicorp-vault-eks-addon" {
source = "hashicorp/hashicorp-vault-eks-addon/aws"
version = "1.0.0-rc2"
}
⭐ Source on GitHub 📦 Registry page

README

HashiCorp Vault Add-on for AWS EKS > Deploy HashiCorp Vault to AWS EKS Clusters with this add-on. Table of Contents - HashiCorp Vault Addon for AWS EKS - Table of Contents - Usage - Author Information - License Usage If you would like to override any defaults with the chart, you can do so by passing the helm_config variable. For a more extensive example, see blueprints/getting-started. Unsealing Vault Once the add-on has been deployed, you can unseal the Vault server using the following commands. > You will need to be in the vault (Kubernetes) namespace while running these commands, by default First, initialize the Vault server. This will return unseal keys and root token. Store this in a safe place since you will use them to unseal the Vault server. ``sh kubectl exec -it vault-0 -n vault

Inputs (2)

NameTypeDescriptionDefault
helm_configanyHashiCorp Vault Helm chart configuration{}
manage_via_gitopsboolDetermines if the add-on should be managed via GitOpsfalse

Outputs (2)

argocd_gitops_config — Configuration used for managing the add-on with ArgoCD
merged_helm_config — (merged) Helm Config for HashiCorp Vault

Resources (1)

helm_release

Details

FrameworkTerraform Module
LanguageHCL
Version1.0.0-rc2
Cloud AWS
★ Stars23
Forks13
Total downloads2.7M
Inputs2
Outputs2
Resources1
LicenseApache-2.0
Namespacehashicorp
Updated