hashicorp-vault-eks-addon

hashicorp/hashicorp-vault-eks-addon/aws

Terraform Module HCL AWS

HashiCorp Vault Add-on for AWS EKS

Install
module "hashicorp-vault-eks-addon" {
source = "hashicorp/hashicorp-vault-eks-addon/aws"
version = "1.0.0-rc2"
}
plain text: /constructs/tfmod-hashicorp-hashicorp-vault-eks-addon-aws/install.txt
⭐ Source on GitHub 📦 Registry page
README

HashiCorp Vault Add-on for AWS EKS > Deploy HashiCorp Vault to AWS EKS Clusters with this add-on. Table of Contents - HashiCorp Vault Addon for AWS EKS - Table of Contents - Usage - Author Information - License Usage If you would like to override any defaults with the chart, you can do so by passing the helm_config variable. For a more extensive example, see blueprints/getting-started. Unsealing Vault Once the add-on has been deployed, you can unseal the Vault server using the following commands. > You will need to be in the vault (Kubernetes) namespace while running these commands, by default First, initialize the Vault server. This will return unseal keys and root token. Store this in a safe place since you will use them to unseal the Vault server. ``sh kubectl exec -it vault-0 -n vault

Inputs (2)
NameTypeDescriptionDefault
helm_configanyHashiCorp Vault Helm chart configuration{}
manage_via_gitopsboolDetermines if the add-on should be managed via GitOpsfalse
Outputs (2)
argocd_gitops_config — Configuration used for managing the add-on with ArgoCD
merged_helm_config — (merged) Helm Config for HashiCorp Vault
Resources (1)
helm_release
Details
FrameworkTerraform Module
LanguageHCL
Version1.0.0-rc2
Cloud AWS
★ Stars23
Forks13
Total downloads2.7M
Inputs2
Outputs2
Resources1
LicenseApache-2.0
Namespacehashicorp
Updated