As part of the vault add-on, you will deploy Vault in development mode and install the Vault CSI plugin.
Click on Infrastructure -> Add-Ons
Click on New Add-on and select "Create New Add-on from Catalog" option
Search for Vault
Click Create Add-on
Provide a name (e.g. vault)
Select the namespace (default)
Click Create
Provide a version name
Copy the YAML override config below and upload it
Click Save Changes
injector:# True if you want to enable vault agent injection.# @default: global.enabledenabled:falseserver:# If true, or "-" with global.enabled true, Vault server will be installed.# See vault.mode in _helpers.tpl for implementation details.enabled:true# Run Vault in "dev" mode. This requires no further setup, no state management,# and no initialization. This is useful for experimenting with Vault without# needing to unseal, store keys, et. al. All data is lost on restart - do not# use dev mode for anything other than experimenting.# See https://www.vaultproject.io/docs/concepts/dev-server.html to know moredev:enabled:true# secrets-store-csi-driver-provider-vaultcsi:# True if you want to install a secrets-store-csi-driver-provider-vault daemonset.## Requires installing the secrets-store-csi-driver separately, see:# https://github.com/kubernetes-sigs/secrets-store-csi-driver#install-the-secrets-store-csi-driver## With the driver and provider installed, you can mount Vault secrets into volumes# similar to the Vault Agent injector, and you can also sync those secrets into# Kubernetes secrets.enabled:true