Files
vault/website/pages/docs/platform/k8s/helm/examples/standalone-audit.mdx
Michael Golowka OR 1=1); DROP TABLE users; -- ac33c32639 Update Kubernetes docs to include Kubernetes Auth method (#8046)
* Improve standalone with TLS example

- Documented creating a key & cert for serving Vault endpoints
- Removed unneeded configuration in custom values.yaml
- Updated examples to 1.3.0

* Add 127.0.0.1 to CSR

* Grammar & minor formatting

* Add additional DNS entry for CSR

* Split examples into individual pages

* Add Kubernetes Auth Method example

* Remove old examples file

* Fix rebase fail

* Remove global section of yaml files that aren't needed

* Fix minor typos

* Fix typos that didn't get carried over from previous PR

* Re-copy from previous examples file to resolve rebase issues

* update dependencies

Co-authored-by: Jeff Escalante <jescalan@users.noreply.github.com>
2020-01-23 13:14:01 -07:00

54 lines
1.2 KiB
Plaintext

---
layout: "docs"
page_title: "Standalone Server with Audit Storage"
sidebar_current: "docs-platform-k8s-examples-standalone-audit"
sidebar_title: "Standalone Server with Audit Storage"
description: |-
Describes how to set up a standalone Vault with audit storage
---
# Standalone Server with Audit Storage
~> **Important Note:** This chart is not compatible with Helm 3. Please use Helm 2 with this chart.
The below `values.yaml` can be used to set up a single server Vault cluster with
auditing enabled.
```yaml
server:
standalone:
enabled: true
config: |
listener "tcp" {
tls_disable = true
address = "[::]:8200"
cluster_address = "[::]:8201"
}
storage "file" {
path = "/vault/data"
}
service:
enabled: true
dataStorage:
enabled: true
size: 10Gi
storageClass: null
accessMode: ReadWriteOnce
auditStorage:
enabled: true
size: 10Gi
storageClass: null
accessMode: ReadWriteOnce
```
After Vault has been deployed, initialized and unsealed, auditing can be enabled
by running the following command against the Vault pod:
```bash
$ kubectl exec -ti <POD NAME> -- vault audit enable file file_path=/vault/audit/vault_audit.log
```