Vault
| Channel | Revision | Published | Runs on |
|---|---|---|---|
| latest/edge | 89 | 31 Jan 2024 | |
| latest/edge | 9 | 27 Jan 2023 | |
| 1.16/stable | 323 | 20 Jan 2025 | |
| 1.16/candidate | 474 | 18 Nov 2025 | |
| 1.16/beta | 474 | 18 Nov 2025 | |
| 1.16/edge | 482 | 04 Dec 2025 | |
| 1.18/stable | 446 | 26 Sep 2025 | |
| 1.18/candidate | 446 | 26 Sep 2025 | |
| 1.18/beta | 459 | 16 Oct 2025 | |
| 1.18/edge | 480 | 03 Dec 2025 | |
| 1.17/stable | 354 | 11 Apr 2025 | |
| 1.17/candidate | 354 | 11 Apr 2025 | |
| 1.17/beta | 383 | 14 Jul 2025 | |
| 1.17/edge | 481 | 04 Dec 2025 | |
| 1.15/stable | 248 | 24 Jul 2024 | |
| 1.15/candidate | 248 | 24 Jul 2024 | |
| 1.15/beta | 248 | 24 Jul 2024 | |
| 1.15/edge | 248 | 10 Jul 2024 |
juju deploy vault-k8s --channel 1.18/candidate
Deploy Kubernetes operators easily with Juju, the Universal Operator Lifecycle Manager. Need a Kubernetes cluster? Install MicroK8s to create a full CNCF-certified Kubernetes system in under 60 seconds.
Platform:
-
access_country_name | string
The Vault charm will use this configuration option when requesting a certificate from a TLS provider using the
tls-certificates-accesscharm relation interface. If not set, the Vault charm will request a certificate without this attribute. -
access_email_address | string
The Vault charm will use this configuration option when requesting a certificate from a TLS provider using the
tls-certificates-accesscharm relation interface. If not set, the Vault charm will request a certificate without this attribute. -
access_locality_name | string
The Vault charm will use this configuration option when requesting a certificate from a TLS provider using the
tls-certificates-accesscharm relation interface. If not set, the Vault charm will request a certificate without this attribute. -
access_organization | string
The Vault charm will use this configuration option when requesting a certificate from a TLS provider using the
tls-certificates-accesscharm relation interface. If not set, the Vault charm will request a certificate without this attribute. -
access_organizational_unit | string
The Vault charm will use this configuration option when requesting a certificate from a TLS provider using the
tls-certificates-accesscharm relation interface. If not set, the Vault charm will request a certificate without this attribute. -
access_sans_dns | string
The Vault charm will use this configuration option when requesting a certificate from a TLS provider using the
tls-certificates-accesscharm relation interface. If not set, the Vault charm will automatically generate subject alternative names. -
access_state_or_province_name | string
The Vault charm will use this configuration option when requesting a certificate from a TLS provider using the
tls-certificates-accesscharm relation interface. If not set, the Vault charm will request a certificate without this attribute. -
acme_allow_any_name | boolean
Allow the ACME server of Vault to issue certificates for any domain name. The Vault charm will use this configuration option in the context of acting as an intermediate CA.
-
acme_allow_ip_sans | boolean
Allow the ACME server of Vault to issue certificates with IP Subject Alternative Names. The Vault charm will use this configuration option in the context of acting as an intermediate CA.
-
acme_allow_subdomains | boolean
Specifies if clients can request certificates with common names that are subdomains of the common name in the
allowed_domainslist. This includes wildcard subdomains. For example, an allowed_domains value ofexample.comwith this option set totruewill allowfoo.example.comandfou.bar.example.comas well as*.example.com. -
acme_allow_wildcard_certificates | boolean
Default: True
Specifies if clients can request certificates certificates with RFC 6125 wildcards in the CN field. When set to False, Vault will not issue wildcards, even if they would've been allowed by another option. Vault supports the following four wildcard types: -
*.example.com: a single wildcard as the entire left-most label -foo*.example.com: a single suffixed wildcard in the left-most label -*foo.example.com: a single prefixed wildcard in the left-most label -f*o.example.com: a single interior wildcard in the left-most label -
acme_allowed_domains | string
A comma-separated list of domain names for which the Vault charm can sign certificates. The Vault charm will use this configuration option in the context of acting as an intermediate CA. Certificate requests for clients using the ACME server of Vault will need to use a domain name from this list.
-
acme_ca_common_name | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-acmecharm relation interface. Requirers using the ACME server of Vault will receive signed certificates from that CA. This option is required when using thetls-certificates-acmecharm relation interface. -
acme_ca_country_name | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-acmecharm relation interface. Requirers using the ACME server of Vault will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
acme_ca_email_address | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-acmecharm relation interface. Requirers using the ACME server of Vault will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
acme_ca_locality_name | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-acmecharm relation interface. Requirers using the ACME server of Vault will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
acme_ca_organization | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-acmecharm relation interface. Requirers using the ACME server of Vault will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
acme_ca_organizational_unit | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-acmecharm relation interface. Requirers using the ACME server of Vault will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
acme_ca_sans_dns | string
Comma-separated list of DNS names for the CA certificate. The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-acmecharm relation interface. Requirers using the ACME server of Vault will receive signed certificates from that CA. If not set, the Vault charm will automatically generate subject alternative names. -
acme_ca_state_or_province_name | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-acmecharm relation interface. Requirers using the ACME server of Vault will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
acme_country | string
This value specifies the C (Country) value in the Subject field of the certificate issued by Vault ACME. If not set the issued certificate will not have a C value in the Subject field.
-
acme_locality | string
This value specifies the L (Locality) value in the Subject field of the certificate issued by Vault PKI. If not set the issued certificate will not have an L value in the Subject field.
-
acme_organization | string
This value specifies the O (Organization) value in the Subject field of the certificate issued by Vault ACME. If not set the issued certificate will not have an O value in the Subject field.
-
acme_organizational_unit | string
This value specifies the OU (Organizational Unit) value in the Subject field of the certificate issued by Vault ACME. If not set the issued certificate will not have an OU value in the Subject field.
-
acme_province | string
This value specifies the ST (State or Province) value in the Subject field of the certificate issued by Vault ACME. If not set the issued certificate will not have a ST value in the Subject field.
-
cpu-limit | string
K8s cpu resource limit, e.g. "1" or "500m". Default is unset (no limit). If you set a limit below the request, the limit will be automatically raised to the request. If you set a limit above the request, that limit is used while the request remains unchanged. See https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ Using this option requires the juju trust status of the charm to be set to True.
-
cpu-request | string
K8s cpu resource request, e.g. "750m". Default is unset (no request). See https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ Using this option requires the juju trust status of the charm to be set to True.
-
default_lease_ttl | string
Default: 168h
Specifies the default lease duration for Vault's tokens and secrets.
-
log_level | string
Default: info
The log verbosity level. Supported values (in order of descending detail) are trace, debug, info, warn, and error.
-
max_lease_ttl | string
Default: 720h
Specifies the maximum possible lease duration for Vault's tokens and secrets.
-
memory-limit | string
K8s memory resource limit, e.g. "1Gi". Default is unset (no limit). If you set a limit below the request, the limit will be automatically raised to the request. If you set a limit above the request, that limit is used while the request remains unchanged. See https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ Using this option requires the juju trust status of the charm to be set to True.
-
memory-request | string
K8s memory resource request, e.g. "1.5Gi". Default is unset (no request). See https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ Using this option requires the juju trust status of the charm to be set to True.
-
pki_allow_any_name | boolean
Allow the Vault charm to sign certificates coming from the
vault-pkiintegration for any domain name. The Vault charm will use this configuration option in the context of acting as an intermediate CA. -
pki_allow_ip_sans | boolean
Allow the Vault charm to sign requests with IP Subject Alternative Names. The Vault charm will use this configuration option in the context of acting as an intermediate CA.
-
pki_allow_subdomains | boolean
Specifies if clients can request certificates with common names that are subdomains of the common name in the
allowed_domainslist. This includes wildcard subdomains. For example, an allowed_domains value ofexample.comwith this option set totruewill allowfoo.example.comandfou.bar.example.comas well as*.example.com. -
pki_allow_wildcard_certificates | boolean
Default: True
Specifies if clients can request certificates certificates with RFC 6125 wildcards in the CN field. When set to False, Vault will not issue wildcards, even if they would've been allowed by another option. Vault supports the following four wildcard types: -
*.example.com: a single wildcard as the entire left-most label -foo*.example.com: a single suffixed wildcard in the left-most label -*foo.example.com: a single prefixed wildcard in the left-most label -f*o.example.com: a single interior wildcard in the left-most label -
pki_allowed_domains | string
A comma-separated list of domain names for which the Vault charm can sign certificates. The Vault charm will use this configuration option in the context of acting as an intermediate CA. Certificate requests for charms integrating with Vault using the
vault-pkiintegration will need to use a domain name from this list. -
pki_ca_common_name | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-pkicharm relation interface. Charms integrating to Vault using thevault-pkicharm relation interface will receive signed certificates from that CA. This option is required when using thetls-certificates-pkicharm relation interface. -
pki_ca_country_name | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-pkicharm relation interface. Charms integrating to Vault using thevault-pkicharm relation interface will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
pki_ca_email_address | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-pkicharm relation interface. Charms integrating to Vault using thevault-pkicharm relation interface will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
pki_ca_locality_name | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-pkicharm relation interface. Charms integrating to Vault using thevault-pkicharm relation interface will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
pki_ca_organization | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-pkicharm relation interface. Charms integrating to Vault using thevault-pkicharm relation interface will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
pki_ca_organizational_unit | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-pkicharm relation interface. Charms integrating to Vault using thevault-pkicharm relation interface will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
pki_ca_sans_dns | string
Comma-separated list of DNS names for the CA certificate. The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-pkicharm relation interface. Charms integrating to Vault using thevault-pkicharm relation interface will receive signed certificates from that CA. If not set, the Vault charm will automatically generate subject alternative names. -
pki_ca_state_or_province_name | string
The Vault charm will use this configuration option when requesting a CA certificate from a TLS provider using the
tls-certificates-pkicharm relation interface. Charms integrating to Vault using thevault-pkicharm relation interface will receive signed certificates from that CA. If not set, the Vault charm will request a CA certificate without this attribute. -
pki_country | string
This value specifies the C (Country) value in the Subject field of the certificate issued by Vault PKI. If not set the issued certificate will not have a C value in the Subject field.
-
pki_locality | string
This value specifies the L (Locality) value in the Subject field of the certificate issued by Vault PKI. If not set the issued certificate will not have an L value in the Subject field.
-
pki_organization | string
This value specifies the O (Organization) value in the Subject field of the certificate issued by Vault PKI. If not set the issued certificate will not have an O value in the Subject field.
-
pki_organizational_unit | string
This value specifies the OU (Organizational Unit) value in the Subject field of the certificate issued by Vault PKI. If not set the issued certificate will not have an OU value in the Subject field.
-
pki_province | string
This value specifies the ST (State or Province) value in the Subject field of the certificate issued by Vault PKI. If not set the issued certificate will not have a ST value in the Subject field.