diff --git a/website/content/docs/k8s/helm.mdx b/website/content/docs/k8s/helm.mdx
index c4f639b2792b..3bc4ab0ff5b5 100644
--- a/website/content/docs/k8s/helm.mdx
+++ b/website/content/docs/k8s/helm.mdx
@@ -20,27 +20,22 @@ with Consul.
Use these links to navigate to a particular top-level stanza.
-- [Helm Chart Reference](#helm-chart-reference)
- - [Top-Level Stanzas](#top-level-stanzas)
- - [All Values](#all-values)
- - [`global`](#h-global)
- - [`server`](#h-server)
- - [`externalServers`](#h-externalservers)
- - [`client`](#h-client)
- - [`dns`](#h-dns)
- - [`ui`](#h-ui)
- - [`syncCatalog`](#h-synccatalog)
- - [`connectInject`](#h-connectinject)
- - [`meshGateway`](#h-meshgateway)
- - [`ingressGateways`](#h-ingressgateways)
- - [`terminatingGateways`](#h-terminatinggateways)
- - [`apiGateway`](#h-apigateway)
- - [`webhookCertManager`](#h-webhookcertmanager)
- - [`prometheus`](#h-prometheus)
- - [`tests`](#h-tests)
- - [`telemetryCollector`](#h-telemetrycollector)
- - [Helm Chart Examples](#helm-chart-examples)
- - [Customizing the Helm Chart](#customizing-the-helm-chart)
+- [`global`](#h-global)
+- [`server`](#h-server)
+- [`externalServers`](#h-externalservers)
+- [`client`](#h-client)
+- [`dns`](#h-dns)
+- [`ui`](#h-ui)
+- [`syncCatalog`](#h-synccatalog)
+- [`connectInject`](#h-connectinject)
+- [`meshGateway`](#h-meshgateway)
+- [`ingressGateways`](#h-ingressgateways)
+- [`terminatingGateways`](#h-terminatinggateways)
+- [`apiGateway`](#h-apigateway)
+- [`webhookCertManager`](#h-webhookcertmanager)
+- [`prometheus`](#h-prometheus)
+- [`tests`](#h-tests)
+- [`telemetryCollector`](#h-telemetrycollector)
## All Values
@@ -212,7 +207,7 @@ Use these links to navigate to a particular top-level stanza.
- `secretKey` ((#v-global-secretsbackend-vault-ca-secretkey)) (`string: ""`) - The key within the Kubernetes or Vault secret that holds the Vault CA certificate.
- - `connectCA` ((#v-global-secretsbackend-vault-connectca)) - Configuration for the Vault service mesh CA provider.
+ - `connectCA` ((#v-global-secretsbackend-vault-connectca)) - Configuration for the Vault Connect CA provider.
The provider will be configured to use the Vault Kubernetes auth method
and therefore requires the role provided by `global.secretsBackend.vault.consulServerRole`
to have permissions to the root and intermediate PKI paths.
@@ -224,13 +219,13 @@ Use these links to navigate to a particular top-level stanza.
- `authMethodPath` ((#v-global-secretsbackend-vault-connectca-authmethodpath)) (`string: kubernetes`) - The mount path of the Kubernetes auth method in Vault.
- `rootPKIPath` ((#v-global-secretsbackend-vault-connectca-rootpkipath)) (`string: ""`) - The path to a PKI secrets engine for the root certificate.
- For more details, please refer to [Vault service mesh CA configuration](https://developer.hashicorp.com/consul/docs/connect/ca/vault#rootpkipath).
+ For more details, please refer to [Vault Connect CA configuration](https://developer.hashicorp.com/consul/docs/connect/ca/vault#rootpkipath).
- `intermediatePKIPath` ((#v-global-secretsbackend-vault-connectca-intermediatepkipath)) (`string: ""`) - The path to a PKI secrets engine for the generated intermediate certificate.
- For more details, please refer to [Vault service mesh CA configuration](https://developer.hashicorp.com/consul/docs/connect/ca/vault#intermediatepkipath).
+ For more details, please refer to [Vault Connect CA configuration](https://developer.hashicorp.com/consul/docs/connect/ca/vault#intermediatepkipath).
- - `additionalConfig` ((#v-global-secretsbackend-vault-connectca-additionalconfig)) (`string: {}`) - Additional service mesh CA configuration in JSON format.
- Please refer to [Vault service mesh CA configuration](https://developer.hashicorp.com/consul/docs/connect/ca/vault#configuration)
+ - `additionalConfig` ((#v-global-secretsbackend-vault-connectca-additionalconfig)) (`string: {}`) - Additional Connect CA configuration in JSON format.
+ Please refer to [Vault Connect CA configuration](https://developer.hashicorp.com/consul/docs/connect/ca/vault#configuration)
for all configuration options available for that provider.
Example:
@@ -251,14 +246,14 @@ Use these links to navigate to a particular top-level stanza.
- `caCert` ((#v-global-secretsbackend-vault-connectinject-cacert)) - Configuration to the Vault Secret that Kubernetes uses on
Kubernetes pod creation, deletion, and update, to get CA certificates
- used issued from vault to send webhooks to the connect inject.
+ used issued from vault to send webhooks to the ConnectInject.
- `secretName` ((#v-global-secretsbackend-vault-connectinject-cacert-secretname)) (`string: null`) - The Vault secret path that contains the CA certificate for
- connect inject webhooks.
+ Connect Inject webhooks.
- `tlsCert` ((#v-global-secretsbackend-vault-connectinject-tlscert)) - Configuration to the Vault Secret that Kubernetes uses on
Kubernetes pod creation, deletion, and update, to get TLS certificates
- used issued from vault to send webhooks to the connect inject.
+ used issued from vault to send webhooks to the ConnectInject.
- `secretName` ((#v-global-secretsbackend-vault-connectinject-tlscert-secretname)) (`string: null`) - The Vault secret path that issues TLS certificates for connect
inject webhooks.
@@ -410,6 +405,23 @@ Use these links to navigate to a particular top-level stanza.
- `secretKey` ((#v-global-acls-replicationtoken-secretkey)) (`string: null`) - The key within the Kubernetes or Vault secret that holds the replication token.
+ - `resources` ((#v-global-acls-resources)) (`map`) - The resource requests (CPU, memory, etc.) for the server-acl-init and server-acl-init-cleanup pods.
+ This should be a YAML map corresponding to a Kubernetes
+ [`ResourceRequirements``](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#resourcerequirements-v1-core)
+ object.
+
+ Example:
+
+ ```yaml
+ resources:
+ requests:
+ memory: '200Mi'
+ cpu: '100m'
+ limits:
+ memory: '200Mi'
+ cpu: '100m'
+ ```
+
- `partitionToken` ((#v-global-acls-partitiontoken)) - partitionToken references a Vault secret containing the ACL token to be used in non-default partitions.
This value should only be provided in the default partition and only when setting
the `global.secretsBackend.vault.enabled` value to true.
@@ -689,10 +701,10 @@ Use these links to navigate to a particular top-level stanza.
contains best practices and recommendations for selecting suitable
hardware sizes for your Consul servers.
- - `connect` ((#v-server-connect)) (`boolean: true`) - This will enable/disable [service mesh](https://developer.hashicorp.com/consul/docs/connect). Setting this to true
+ - `connect` ((#v-server-connect)) (`boolean: true`) - This will enable/disable [Connect](https://developer.hashicorp.com/consul/docs/connect). Setting this to true
_will not_ automatically secure pod communication, this
setting will only enable usage of the feature. Consul will automatically initialize
- a new CA and set of certificates. Additional service mesh settings can be configured
+ a new CA and set of certificates. Additional Connect settings can be configured
by setting the `server.extraConfig` value.
- `serviceAccount` ((#v-server-serviceaccount))
@@ -716,10 +728,10 @@ Use these links to navigate to a particular top-level stanza.
```yaml
resources:
requests:
- memory: '100Mi'
+ memory: '200Mi'
cpu: '100m'
limits:
- memory: '100Mi'
+ memory: '200Mi'
cpu: '100m'
```
@@ -966,6 +978,56 @@ Use these links to navigate to a particular top-level stanza.
...
```
+ - `auditLogs` ((#v-server-auditlogs)) - Added in Consul 1.8, the audit object allow users to enable auditing
+ and configure a sink and filters for their audit logs. Please refer to
+ [audit logs](https://developer.hashicorp.com/consul/docs/enterprise/audit-logging) documentation
+ for further information.
+
+ - `enabled` ((#v-server-auditlogs-enabled)) (`boolean: false`) - Controls whether Consul logs out each time a user performs an operation.
+ global.acls.manageSystemACLs must be enabled to use this feature.
+
+ - `sinks` ((#v-server-auditlogs-sinks)) (`array