Releasing HashiCorp Vault Helm Chart 0.2.0
The Vault team is happy to announce the release of an updated version of the Helm Chart for Vault. The Vault Helm Chart greatly reduces the complexity of running Vault on Kubernetes, and allows for Vault clusters to be up and running in just minutes. If you would like to learn more please see our initial release announcement.
» What's New
Here are a few highlights from the Vault Helm Chart 0.2.0 release. These mostly consist of several requested features, many feature improvements, and bug fixes.
- Added Load Balancer & Ingress support
- Removed root requirements, now runs as Vault user
- Improvements (configurable ports, Read Only Root FS, annotations, etc)
Please see the changelog for a complete listing. We also wanted to thank the community for the great feedback, as it helps drive improvements to the Helm Chart, and also highlight areas for improvement.
» Next Steps
The updated 0.2.0 Helm chart is available now on GitHub. To learn more, please see the Helm Chart documentation, or the documentation on Running Vault on Kubernetes. Also, if you enjoy playing around with this type of stuff, maybe you’d be interested in working at Hashicorp too since we're hiring!
Sign up for the latest HashiCorp news
More blog posts like this one

HCP Terraform introduces Hold Your Own Key (HYOK)
HCP Terraform customers can now gain greater control over access to secrets within Terraform artifacts such as state and plan files with Hold Your Own Key (HYOK).

Nomad secrets consumption patterns: Vault integration
Learn how to consume application secrets in HashiCorp Nomad using HashiCorp Vault.

Secure AI identity with HashiCorp Vault
HashiCorp Vault's dynamic credentials give AI applications traceable, short-lived identities with just-in-time access, replacing risky static credentials. Try our proof-of-concept LangChain application to see how this can work.