mirror of
https://github.com/external-secrets/external-secrets.git
synced 2024-12-14 11:57:59 +00:00
2.9 KiB
2.9 KiB
external-secrets
External secret management for Kubernetes
TL;DR
helm repo add external-secrets https://external-secrets.github.io/external-secrets
helm install external-secrets/external-secrets
Installing the Chart
To install the chart with the release name external-secrets
:
helm install external-secrets external-secrets/external-secrets
Custom Resources
By default, the chart will install external-secrets CRDs, this can be controlled with installCRDs
value.
Uninstalling the Chart
To uninstall the external-secrets
deployment:
helm uninstall external-secrets
The command removes all the Kubernetes components associated with the chart and deletes the release.
Configuration
Read through the external-secrets values.yaml file. It has several commented out suggested values.
Values
Key | Type | Default | Description |
---|---|---|---|
affinity | object | {} |
|
extraArgs | object | {} |
|
extraEnv | list | [] |
|
fullnameOverride | string | "" |
|
image.pullPolicy | string | "IfNotPresent" |
|
image.repository | string | "ghcr.io/external-secrets/external-secrets" |
|
image.tag | string | "" |
The image tag to use. The default is the chart appVersion. |
imagePullSecrets | list | [] |
|
installCRDs | bool | true |
If set, install and upgrade CRDs through helm chart. |
leaderElect | bool | true |
If true, external-secrets will perform leader election between instances to ensure no more than one instance of external-secrets operates at a time. |
nameOverride | string | "" |
|
nodeSelector | object | {} |
|
podAnnotations | object | {} |
|
podLabels | object | {} |
|
podSecurityContext | object | {} |
|
prometheus.enabled | bool | false |
Specifies whether to expose Service resource for collecting Prometheus metrics |
prometheus.service.port | int | 8080 |
|
rbac.create | bool | true |
Specifies whether role and rolebinding resources should be created. |
replicaCount | int | 1 |
|
resources | object | {} |
|
securityContext | object | {} |
|
serviceAccount.annotations | object | {} |
Annotations to add to the service account. |
serviceAccount.create | bool | true |
Specifies whether a service account should be created. |
serviceAccount.name | string | "" |
The name of the service account to use. If not set and create is true, a name is generated using the fullname template. |
tolerations | list | [] |