open-vault/website/content/docs/platform/k8s/helm/examples/standalone-audit.mdx
Bryce Kalow b76a56d40c
feat(website): migrates nav data format and updates docs pages (#11242)
* migrates nav data format and updates docs pages

* removes sidebar_title from content files
2021-04-06 13:49:04 -04:00

53 lines
1.2 KiB
Plaintext

---
layout: 'docs'
page_title: 'Standalone Server with Audit Storage'
sidebar_current: 'docs-platform-k8s-examples-standalone-audit'
description: |-
Describes how to set up a standalone Vault with audit storage
---
# Standalone Server with Audit Storage
~> **Important Note:** This chart is not compatible with Helm 2. Please use Helm 3 with this chart.
The below `values.yaml` can be used to set up a single server Vault cluster with
auditing enabled.
```yaml
server:
standalone:
enabled: true
config: |
listener "tcp" {
tls_disable = true
address = "[::]:8200"
cluster_address = "[::]:8201"
}
storage "file" {
path = "/vault/data"
}
service:
enabled: true
dataStorage:
enabled: true
size: 10Gi
storageClass: null
accessMode: ReadWriteOnce
auditStorage:
enabled: true
size: 10Gi
storageClass: null
accessMode: ReadWriteOnce
```
After Vault has been deployed, initialized and unsealed, auditing can be enabled
by running the following command against the Vault pod:
```shell-session
$ kubectl exec -ti <POD NAME> -- vault audit enable file file_path=/vault/audit/vault_audit.log
```