hashicorp-vault-eks-addon
hashicorp/hashicorp-vault-eks-addon/aws
HashiCorp Vault Add-on for AWS EKS
HashiCorp Vault Add-on for AWS EKS > Deploy HashiCorp Vault to AWS EKS Clusters with this add-on. Table of Contents - HashiCorp Vault Addon for AWS EKS - Table of Contents - Usage - Author Information - License Usage If you would like to override any defaults with the chart, you can do so by passing the helm_config variable. For a more extensive example, see blueprints/getting-started. Unsealing Vault Once the add-on has been deployed, you can unseal the Vault server using the following commands. > You will need to be in the vault (Kubernetes) namespace while running these commands, by default First, initialize the Vault server. This will return unseal keys and root token. Store this in a safe place since you will use them to unseal the Vault server. ``sh kubectl exec -it vault-0 -n vault
| Name | Type | Description | Default |
|---|---|---|---|
| helm_config | any | HashiCorp Vault Helm chart configuration | {} |
| manage_via_gitops | bool | Determines if the add-on should be managed via GitOps | false |
argocd_gitops_config — Configuration used for managing the add-on with ArgoCDmerged_helm_config — (merged) Helm Config for HashiCorp VaultTerraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Azure Verified Pattern Module for Azure Landing Zone
Terraform Azure Verified Resource Module for Key Vault
Terraform module for building and deploying Next.js apps to AWS. Supports SSR (L