Replies: 3 comments 4 replies
-
Thanks, this makes sense. Do you know of an chart that's already using this we could use as a reference? |
Beta Was this translation helpful? Give feedback.
-
Having looked into this some more, a lot of charts use the |
Beta Was this translation helpful? Give feedback.
-
There were too many changes made at once for the test to be easy, a big rewrite.
- name: ENABLE_ES
value: "{{ or $.Values.elasticsearch.enabled $.Values.elasticsearch.external }}"
- name: ES_SEEDS
value: "{{ $.Values.elasticsearch.host }}"
- name: ES_PORT
value: "{{ $.Values.elasticsearch.port }}"
- name: ES_VERSION
value: "{{ $.Values.elasticsearch.version }}"
- name: ES_SCHEME
value: "{{ $.Values.elasticsearch.scheme }}"
- name: ES_VIS_INDEX
value: "{{ $.Values.elasticsearch.visibilityIndex }}"
- name: ES_USER
value: "{{ $.Values.elasticsearch.username }}"
- name: ES_PWD
value: "{{ $.Values.elasticsearch.password }}" from server-deployment.yaml was removed.
|
Beta Was this translation helpful? Give feedback.
-
There is External Secrets Operator (ESO) that provides support of
kind: ExternalSecret
CRDs.This is de-facto the best practice of using secrets for Kubernetes payloads that currently exists in the industry.
The way it works - is pretty simple: basically, you just apply a manifest with a SecretStore (or a ClusterSecretStore) that defines the access to a vault (it supports many kinds of vaults) and an ExternalSecret (or ClusterExternalSecret) manifest that describes which secret (exact path and specific key (or all keys from that path)) to read from that vault and which
kind: Secret
to save it to in Kubernetes.It would be nice to make temporal's helm chart have support for it.
Bringing support for ExternalSecrets into this chart would require some changes (introduce new values and change the way the secrets are currently mounted into containers).
Beta Was this translation helpful? Give feedback.
All reactions