|
|
4 years ago | |
|---|---|---|
| .. | ||
| ci | 5 years ago | |
| templates | 4 years ago | |
| .helmignore | 5 years ago | |
| Chart.yaml | 4 years ago | |
| README.md | 4 years ago | |
| README.md.gotmpl | 4 years ago | |
| values.yaml | 4 years ago | |

External secret management for Kubernetes
helm repo add external-secrets https://charts.external-secrets.io
helm install external-secrets/external-secrets
To install the chart with the release name external-secrets:
helm install external-secrets external-secrets/external-secrets
By default, the chart will install external-secrets CRDs, this can be controlled with installCRDs value.
To uninstall the external-secrets deployment:
helm uninstall external-secrets
The command removes all the Kubernetes components associated with the chart and deletes the release.
| Key | Type | Default | Description |
|---|---|---|---|
| affinity | object | {} |
|
| extraArgs | object | {} |
|
| extraEnv | list | [] |
|
| fullnameOverride | string | "" |
|
| image.pullPolicy | string | "IfNotPresent" |
|
| image.repository | string | "ghcr.io/external-secrets/external-secrets" |
|
| image.tag | string | "" |
The image tag to use. The default is the chart appVersion. |
| imagePullSecrets | list | [] |
|
| installCRDs | bool | true |
If set, install and upgrade CRDs through helm chart. |
| leaderElect | bool | false |
If true, external-secrets will perform leader election between instances to ensure no more than one instance of external-secrets operates at a time. |
| nameOverride | string | "" |
|
| nodeSelector | object | {} |
|
| podAnnotations | object | {} |
|
| podLabels | object | {} |
|
| podSecurityContext | object | {} |
|
| priorityClassName | string | "" |
Pod priority class name. |
| prometheus.enabled | bool | false |
Specifies whether to expose Service resource for collecting Prometheus metrics |
| prometheus.service.port | int | 8080 |
|
| rbac.create | bool | true |
Specifies whether role and rolebinding resources should be created. |
| replicaCount | int | 1 |
|
| resources | object | {} |
|
| scopedNamespace | string | "" |
If set external secrets are only reconciled in the provided namespace |
| securityContext | object | {} |
|
| serviceAccount.annotations | object | {} |
Annotations to add to the service account. |
| serviceAccount.create | bool | true |
Specifies whether a service account should be created. |
| serviceAccount.name | string | "" |
The name of the service account to use. If not set and create is true, a name is generated using the fullname template. |
| tolerations | list | [] |