Skip to content

Commit

Permalink
Merge pull request #66 from hashicorp/hcp-vault-eks
Browse files Browse the repository at this point in the history
Adding Values files
  • Loading branch information
danielehc authored Jun 9, 2022
2 parents 8ca4012 + ba57e18 commit 1f4e2a5
Show file tree
Hide file tree
Showing 3 changed files with 177 additions and 1 deletion.
6 changes: 5 additions & 1 deletion hcp-vault-eks/.gitignore
Original file line number Diff line number Diff line change
@@ -1,4 +1,8 @@
# Local gitignore

# Helm Values
*values.yaml
*values-*.yaml
vault-values.yaml

# Scripts in the main folder ignored
*.sh
90 changes: 90 additions & 0 deletions hcp-vault-eks/consul-ent-values.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,90 @@
global:
datacenter: "dc1"
name: consul
domain: consul
image: hashicorp/consul-enterprise:1.12-ent
secretsBackend:
vault:
enabled: true
consulServerRole: consul-server
consulClientRole: consul-client
consulCARole: consul-ca
connectCA:
address: $VAULT_PRIVATE_ADDR
rootPKIPath: connect-root/
intermediatePKIPath: connect-intermediate-dc1/
additionalConfig: "{\"connect\": [{ \"ca_config\": [{ \"namespace\": \"admin\"}]}]}"
agentAnnotations: |
"vault.hashicorp.com/namespace": "admin"
enterpriseLicense:
secretName: 'consul/data/secret/enterpriselicense'
secretKey: 'key'

tls:
enabled: true
enableAutoEncrypt: true
caCert:
secretName: "pki/cert/ca"
federation:
enabled: false
createFederationSecret: false
acls:
manageSystemACLs: false
gossipEncryption:
secretName: consul/data/secret/gossip
secretKey: gossip
enableConsulNamespaces: true

server:
replicas: 1
exposeGossipAndRPCPorts: true
serverCert:
secretName: "pki/issue/consul-server"

connectInject:
replicas: 1
enabled: true
transparentProxy:
defaultEnabled: true
consulNamespaces:
consulDestinationNamespace: "ns1"
mirroringK8S: true

prometheus:
enabled: true

controller:
enabled: true

meshGateway:
enabled: false
replicas: 1

ingressGateways:
replicas: 1
enabled: true
gateways:
- name: ingress-gateway
service:
type: LoadBalancer
terminatingGateways:
replicas: 1
enabled: true
gateways:
- name: terminating-gateway
service:
type: LoadBalancer
ui:
enabled: true
service:
type: LoadBalancer
metrics:
provider: prometheus
baseURL: http://prometheus-server

syncCatalog:
enabled: true
consulNamespaces:
mirroringK8S: true
k8sDenyNamespaces: ["kube-system", "kube-public", "consul"]

82 changes: 82 additions & 0 deletions hcp-vault-eks/consul-values.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,82 @@
global:
datacenter: "dc1"
name: consul
domain: consul
secretsBackend:
vault:
enabled: true
consulServerRole: consul-server
consulClientRole: consul-client
consulCARole: consul-ca
connectCA:
address: $VAULT_PRIVATE_ADDR
rootPKIPath: connect-root/
intermediatePKIPath: connect-intermediate-dc1/
additionalConfig: "{\"connect\": [{ \"ca_config\": [{ \"namespace\": \"admin\"}]}]}"
agentAnnotations: |
"vault.hashicorp.com/namespace": "admin"
tls:
enabled: true
enableAutoEncrypt: true
caCert:
secretName: "pki/cert/ca"
federation:
enabled: false
createFederationSecret: false
acls:
manageSystemACLs: false
gossipEncryption:
secretName: consul/data/secret/gossip
secretKey: gossip

server:
replicas: 1
exposeGossipAndRPCPorts: true
serverCert:
secretName: "pki/issue/consul-server"

connectInject:
replicas: 1
enabled: true
transparentProxy:
defaultEnabled: true

prometheus:
enabled: true

controller:
enabled: true

meshGateway:
enabled: false
replicas: 1

ingressGateways:
replicas: 1
enabled: true
gateways:
- name: ingress-gateway
service:
type: LoadBalancer
terminatingGateways:
replicas: 1
enabled: true
gateways:
- name: terminating-gateway
service:
type: LoadBalancer
ui:
enabled: true
service:
type: LoadBalancer
metrics:
provider: prometheus
baseURL: http://prometheus-server

syncCatalog:
enabled: true
consulNamespaces:
mirroringK8S: true
k8sDenyNamespaces: ["kube-system", "kube-public", "consul"]

0 comments on commit 1f4e2a5

Please sign in to comment.