istio: enabled: true ingressGateways: passthrough-ingressgateway: type: "LoadBalancer" # nodePortBase: 30200 gateways: passthrough: ingressGateway: "passthrough-ingressgateway" hosts: - "*.{{ .Values.domain }}" tls: mode: "PASSTHROUGH" addons: vault: enabled: true ingress: gateway: "passthrough" # provide the Vault TLS cert and key. BigBang will create the secret and volumemount for you # Leave blank to create your own secret and provide values for your own volume and volumemount key: | -----BEGIN PRIVATE KEY----- xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx -----END PRIVATE KEY----- cert: | -----BEGIN CERTIFICATE----- xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx -----END CERTIFICATE----- values: # disable autoInit. It should not be used for operations. autoInit: enabled: false global: # this is a double negative. Put "false" to enable TLS for passthrough ingress tlsDisable: false server: # Increase default resources resources: requests: memory: 8Gi cpu: 2000m limits: memory: 8Gi cpu: 2000m # disable the Vault provided ingress so that Istio ingress can be used. ingress: enabled: false # Extra environment variable to support high availability extraEnvironmentVars: # the istio gateway domain VAULT_SKIP_VERIFY: "true" VAULT_LOG_FORMAT: "json" VAULT_LICENSE: "your-license-key-goes-here" ha: # enable high availability. enabled: true replicas: 3 # tell the deployments where our Vault API endpoint is # see https://github.com/hashicorp/vault-helm/issues/789 apiAddr: "https://vault.dev.bigbang.mil" # raft is the license free most simple solution for a distributed filesystem raft: enabled: true setNodeId: true # these values should be encrypted to prevent the kms_key_id from being revealed config: | ui = true listener "tcp" { tls_disable = 0 address = "[::]:8200" cluster_address = "[::]:8201" tls_cert_file = "/vault/tls/tls.crt" tls_key_file = "/vault/tls/tls.key" } storage "raft" { path = "/vault/data" retry_join { leader_api_addr = "https://vault-vault-0.vault-vault-internal:8200" leader_client_cert_file = "/vault/tls/tls.crt" leader_client_key_file = "/vault/tls/tls.key" leader_tls_servername = "vault.dev.bigbang.mil" } retry_join { leader_api_addr = "https://vault-vault-1.vault-vault-internal:8200" leader_client_cert_file = "/vault/tls/tls.crt" leader_client_key_file = "/vault/tls/tls.key" leader_tls_servername = "vault.dev.bigbang.mil" } retry_join { leader_api_addr = "https://vault-vault-2.vault-vault-internal:8200" leader_client_cert_file = "/vault/tls/tls.crt" leader_client_key_file = "/vault/tls/tls.key" leader_tls_servername = "vault.dev.bigbang.mil" } } seal "awskms" { region = "us-gov-west-1" kms_key_id = "your-kms-key-goes-here" endpoint = "https://kms.us-gov-west-1.amazonaws.com" } telemetry { prometheus_retention_time = "24h" disable_hostname = true unauthenticated_metrics_access = true } service_registration "kubernetes" {}