Skip to main content

Vault

HashiCorp Vault is an open-source tool that serves as a centralized hub for secrets management, encryption services, and privileged access management. It enhances security by consolidating dynamic secrets, offers robust management within Kubernetes, provides comprehensive data protection features, including encryption and tokenization. Vault is a perfect fit for organizations implementing zero trust strategies, ensuring heightened security and access control.

Example

glitchtip.yaml
kind: Vault
metadata:
name: vault
spec:
host: vault.mycompany.eu
auditStorage:
enabled: true

Spec

NameType
hostString(required)
replicasInt3
uiUiSpec
resourcesResourceRequirements
serviceRegistrationServiceRegistrationSpec
autoUnsealSpecAutoUnsealSpec?nullIf set to null, auto-unsealing is disabled and the vault must be unsealed manually or by external means.
auditStorageAuditStorageSpec

UiSpec

NameTypeDefault
enabledBooleantrueAllows to disable exposure of the vault web UI. It is recommended to disable the web UI if it is not used, to reduce the attack surface of the vault installation.

ServiceRegistrationSpec

NameTypeDefault
enabledBooleantrueToggles the kubernetes service registration feature. If set to true the vault service account is granted permission to patch pod resources in its own namespace. This is done automatically by the Glasskube Operator.

AutoUnsealSpec

NameTypeDefault
addressString(required)
tlsCaSecretSecretKeySelector?null
authPathString"kubernetes"Mount path of the kubernetes auth method in the unsealing vault.
roleNameString?nullIf set to null, a value of "namespace.name" is assumed.
mountPathString"transit"
keyNameString?nullIf set to null, a value of "namespace.name" is assumed.

AuditStorageSpec

NameTypeDefault
enabledBooleantrue
sizeQuantity1Gi