External secrets management for Kubernetes
This package has no upstream release note links on file. Please add some to chart/Chart.yaml under annotations.bigbang.dev/upstreamReleaseNotesMarkdown
.
Example:
annotations:
bigbang.dev/upstreamReleaseNotesMarkdown: |
- [Find our upstream chart's CHANGELOG here](https://link-goes-here/CHANGELOG.md)
- [and our upstream application release notes here](https://another-link-here/RELEASE_NOTES.md)
- Kubernetes Cluster deployed
- Kubernetes config installed in
~/.kube/config
- Helm installed
Kubernetes: >= 1.19.0-0
Install Helm
https://helm.sh/docs/intro/install/
- Clone down the repository
- cd into directory
helm install external-secrets chart/
Key | Type | Default | Description |
---|---|---|---|
domain | string | "bigbang.dev" |
|
namespaceOverride | string | "external-secrets" |
|
rbac.create | bool | true |
|
rbac.servicebindings.create | bool | true |
|
rbac.aggregateToView | bool | true |
|
rbac.aggregateToEdit | bool | true |
|
serviceAccount.create | bool | true |
Specifies whether a service account should be created. |
serviceAccount.automount | bool | true |
Automounts the service account token in all containers of the pod |
serviceAccount.annotations | object | {} |
Annotations to add to the service account. |
serviceAccount.extraLabels | object | {} |
Extra Labels to add to the service account. |
serviceAccount.name | string | "" |
The name of the service account to use. If not set and create is true, a name is generated using the fullname template. |
scopedNamespace | string | "" |
|
scopedRBAC | bool | false |
|
istio.enabled | bool | false |
|
istio.hardened.enabled | bool | false |
|
istio.hardened.outboundTrafficPolicyMode | string | "REGISTRY_ONLY" |
|
istio.hardened.customServiceEntries | list | [] |
|
istio.hardened.customAuthorizationPolicies | list | [] |
|
istio.mtls.mode | string | "STRICT" |
STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic |
istio.injection | string | "disabled" |
|
networkPolicies.enabled | bool | false |
|
networkPolicies.ingressLabels.app | string | "istio-ingressgateway" |
|
networkPolicies.ingressLabels.istio | string | "ingressgateway" |
|
networkPolicies.additionalPolicies | list | [] |
|
bbtests.enabled | bool | false |
|
bbtests.namespace | string | "external-secrets" |
|
bbtests.scripts.image | string | "registry1.dso.mil/ironbank/big-bang/base:2.1.0" |
|
bbtests.secretstore.name | string | "external-secrets-test-store" |
|
bbtests.serviceaccount.name | string | "external-secrets-script-sa" |
|
bbtests.secrets.testsecret.value | string | "this is a magic value" |
|
waitJob.enabled | bool | true |
|
waitJob.scripts.image | string | "registry1.dso.mil/ironbank/opensource/kubernetes/kubectl:v1.32.7" |
|
waitJob.permissions.apiGroups[0] | string | "external-secrets.io" |
|
waitJob.permissions.apiGroups[1] | string | "generators.external-secrets.io" |
|
waitJob.permissions.apiGroups[2] | string | "" |
|
waitJob.permissions.resources[0] | string | "acraccesstokens" |
|
waitJob.permissions.resources[1] | string | "clusterexternalsecrets" |
|
waitJob.permissions.resources[2] | string | "clustersecretstores" |
|
waitJob.permissions.resources[3] | string | "ecrauthorizationtokens" |
|
waitJob.permissions.resources[4] | string | "externalsecrets" |
|
waitJob.permissions.resources[5] | string | "fakes" |
|
waitJob.permissions.resources[6] | string | "gcraccesstokens" |
|
waitJob.permissions.resources[7] | string | "githubaccesstokens" |
|
waitJob.permissions.resources[8] | string | "passwords" |
|
waitJob.permissions.resources[9] | string | "pushsecrets" |
|
waitJob.permissions.resources[10] | string | "secretstores" |
|
waitJob.permissions.resources[11] | string | "vaultdynamicsecrets" |
|
waitJob.permissions.resources[12] | string | "webhooks" |
|
waitJob.permissions.resources[13] | string | "secrets" |
|
waitJob.permissions.verbs[0] | string | "create" |
|
waitJob.permissions.verbs[1] | string | "delete" |
|
waitJob.permissions.verbs[2] | string | "get" |
|
waitJob.permissions.verbs[3] | string | "list" |
|
waitJob.permissions.verbs[4] | string | "watch" |
|
env.EXTERNAL_SECRETS_NAMESPACE | string | "external-secrets" |
|
clusterSecretStoreConfiguration.enabled | bool | false |
|
clusterSecretStoreConfiguration.clusterSecretStoreList[0].name | string | "" |
|
clusterSecretStoreConfiguration.clusterSecretStoreList[0].namespace | string | "" |
|
clusterSecretStoreConfiguration.clusterSecretStoreList[0].labels | string | "" |
|
clusterSecretStoreConfiguration.clusterSecretStoreList[0].annotations | string | "" |
|
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source | object | {"auth":{"accessKeyID":"","accessKeyName":"","authType":"","secretAccessKey":""},"provider":"aws","region":"us-gov-west-1","service":"SecretsManager"} |
define types of authentication: ## |
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.provider | string | "aws" |
AWS secrets manager only - other services can be added later ## |
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.service | string | "SecretsManager" |
Specify type of service, i.e., SecretsManager (default) ## |
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.region | string | "us-gov-west-1" |
Specify AWS region, i.e. us-gov-west-1 (default) ## |
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.auth.authType | string | "" |
Specify authType is required: identity, accesskey or serviceaccount ## |
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.auth.accessKeyName | string | "" |
Name of the accessKeyID and secretAccessKey pair ## |
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.auth.accessKeyID | string | "" |
Specify AWS Access Key ID file ## |
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.auth.secretAccessKey | string | "" |
Specify AWS Secret Access Key file ## |
externalSecretsConfiguration.enabled | bool | false |
|
externalSecretsConfiguration.secretList[0].name | string | "" |
|
externalSecretsConfiguration.secretList[0].namespace | string | "" |
|
externalSecretsConfiguration.secretList[0].refreshInterval | string | "1m" |
|
externalSecretsConfiguration.secretList[0].secrets.targetName | string | "" |
|
externalSecretsConfiguration.secretList[0].secrets.targetPolicy | string | "Owner" |
target.creationPolicy default is Owner |
externalSecretsConfiguration.secretList[0].secrets.secretKeyName | object | {"key":"","metadataPolicy":"","property":"","version":""} |
This name allows reference by other objects. |
externalSecretsConfiguration.secretList[0].secrets.secretKeyName.key | string | "" |
Specify key here |
externalSecretsConfiguration.secretList[0].secrets.secretKeyName.version | string | "" |
Key version |
externalSecretsConfiguration.secretList[0].secrets.secretKeyName.property | string | "" |
Specify the property of the secret, i.e. username, password |
externalSecretsConfiguration.secretList[0].secrets.secretKeyName.metadataPolicy | string | "" |
Optional" metadataPolicy for ExternalSecret, i.e. Fetch |
upstream.nameOverride | string | "external-secrets" |
|
upstream.fullnameOverride | string | "external-secrets" |
|
upstream.installCRDs | bool | false |
|
upstream.deploymentAnnotations | object | {} |
|
upstream.webhook.create | bool | false |
|
upstream.rbac.create | bool | false |
|
upstream.certController.create | bool | false |
|
upstream.securityContext.allowPrivilegeEscalation | bool | false |
|
upstream.securityContext.capabilities.drop[0] | string | "ALL" |
|
upstream.securityContext.enabled | bool | true |
|
upstream.securityContext.readOnlyRootFilesystem | bool | true |
|
upstream.securityContext.runAsNonRoot | bool | true |
|
upstream.securityContext.runAsUser | int | 1000 |
|
upstream.securityContext.runAsGroup | int | 1000 |
|
upstream.securityContext.seccompProfile.type | string | "RuntimeDefault" |
|
upstream.resources.requests.memory | string | "256Mi" |
|
upstream.resources.requests.cpu | string | "100m" |
|
upstream.resources.limits.cpu | string | "100m" |
|
upstream.resources.limits.memory | string | "256Mi" |
|
upstream.image.repository | string | "registry1.dso.mil/ironbank/opensource/external-secrets/external-secrets" |
|
upstream.image.pullPolicy | string | "IfNotPresent" |
|
upstream.image.tag | string | "v0.19.0" |
The image tag to use. The default is the chart appVersion. |
upstream.imagePullSecrets[0].name | string | "private-registry" |
Please see the contributing guide if you are interested in contributing.
This file is programatically generated using helm-docs
and some BigBang-specific templates. The gluon
repository has instructions for regenerating package READMEs.