external-secrets values.yaml
📜
domain📜
Type: string
"bigbang.dev"
namespaceOverride📜
Type: string
"external-secrets"
rbac.create📜
Type: bool
true
rbac.servicebindings.create📜
Type: bool
true
rbac.aggregateToView📜
Type: bool
true
rbac.aggregateToEdit📜
Type: bool
true
serviceAccount.create📜
Type: bool
true
Description: Specifies whether a service account should be created.
serviceAccount.automount📜
Type: bool
true
Description: Automounts the service account token in all containers of the pod
serviceAccount.annotations📜
Type: object
{}
Description: Annotations to add to the service account.
serviceAccount.extraLabels📜
Type: object
{}
Description: Extra Labels to add to the service account.
serviceAccount.name📜
Type: string
""
Description: The name of the service account to use. If not set and create is true, a name is generated using the fullname template.
scopedNamespace📜
Type: string
""
scopedRBAC📜
Type: bool
false
istio.enabled📜
Type: bool
false
istio.hardened.enabled📜
Type: bool
false
istio.hardened.outboundTrafficPolicyMode📜
Type: string
"REGISTRY_ONLY"
istio.hardened.customServiceEntries📜
Type: list
[]
istio.hardened.customAuthorizationPolicies📜
Type: list
[]
istio.mtls.mode📜
Type: string
"STRICT"
Description: STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
istio.injection📜
Type: string
"disabled"
networkPolicies.enabled📜
Type: bool
false
networkPolicies.ingressLabels.app📜
Type: string
"istio-ingressgateway"
networkPolicies.ingressLabels.istio📜
Type: string
"ingressgateway"
networkPolicies.additionalPolicies📜
Type: list
[]
bbtests.enabled📜
Type: bool
false
bbtests.namespace📜
Type: string
"external-secrets"
bbtests.scripts.image📜
Type: string
"registry1.dso.mil/ironbank/big-bang/base:2.1.0"
bbtests.secretstore.name📜
Type: string
"external-secrets-test-store"
bbtests.serviceaccount.name📜
Type: string
"external-secrets-script-sa"
bbtests.secrets.testsecret.value📜
Type: string
"this is a magic value"
waitJob.enabled📜
Type: bool
true
waitJob.scripts.image📜
Type: string
"registry1.dso.mil/ironbank/opensource/kubernetes/kubectl:v1.32.7"
waitJob.permissions.apiGroups[0]📜
Type: string
"external-secrets.io"
waitJob.permissions.apiGroups[1]📜
Type: string
"generators.external-secrets.io"
waitJob.permissions.apiGroups[2]📜
Type: string
""
waitJob.permissions.resources[0]📜
Type: string
"acraccesstokens"
waitJob.permissions.resources[1]📜
Type: string
"clusterexternalsecrets"
waitJob.permissions.resources[2]📜
Type: string
"clustersecretstores"
waitJob.permissions.resources[3]📜
Type: string
"ecrauthorizationtokens"
waitJob.permissions.resources[4]📜
Type: string
"externalsecrets"
waitJob.permissions.resources[5]📜
Type: string
"fakes"
waitJob.permissions.resources[6]📜
Type: string
"gcraccesstokens"
waitJob.permissions.resources[7]📜
Type: string
"githubaccesstokens"
waitJob.permissions.resources[8]📜
Type: string
"passwords"
waitJob.permissions.resources[9]📜
Type: string
"pushsecrets"
waitJob.permissions.resources[10]📜
Type: string
"secretstores"
waitJob.permissions.resources[11]📜
Type: string
"vaultdynamicsecrets"
waitJob.permissions.resources[12]📜
Type: string
"webhooks"
waitJob.permissions.resources[13]📜
Type: string
"secrets"
waitJob.permissions.verbs[0]📜
Type: string
"create"
waitJob.permissions.verbs[1]📜
Type: string
"delete"
waitJob.permissions.verbs[2]📜
Type: string
"get"
waitJob.permissions.verbs[3]📜
Type: string
"list"
waitJob.permissions.verbs[4]📜
Type: string
"watch"
env.EXTERNAL_SECRETS_NAMESPACE📜
Type: string
"external-secrets"
clusterSecretStoreConfiguration.enabled📜
Type: bool
false
clusterSecretStoreConfiguration.clusterSecretStoreList[0].name📜
Type: string
""
clusterSecretStoreConfiguration.clusterSecretStoreList[0].namespace📜
Type: string
""
clusterSecretStoreConfiguration.clusterSecretStoreList[0].labels📜
Type: string
""
clusterSecretStoreConfiguration.clusterSecretStoreList[0].annotations📜
Type: string
""
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source📜
Type: object
auth:
accessKeyID: ''
accessKeyName: ''
authType: ''
secretAccessKey: ''
provider: aws
region: us-gov-west-1
service: SecretsManager
Description: define types of authentication: ##
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.provider📜
Type: string
"aws"
Description: AWS secrets manager only - other services can be added later ##
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.service📜
Type: string
"SecretsManager"
Description: Specify type of service, i.e., SecretsManager (default) ##
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.region📜
Type: string
"us-gov-west-1"
Description: Specify AWS region, i.e. us-gov-west-1 (default) ##
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.auth.authType📜
Type: string
""
Description: Specify authType is required: identity, accesskey or serviceaccount ##
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.auth.accessKeyName📜
Type: string
""
Description: Name of the accessKeyID and secretAccessKey pair ##
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.auth.accessKeyID📜
Type: string
""
Description: Specify AWS Access Key ID file ##
clusterSecretStoreConfiguration.clusterSecretStoreList[0].source.auth.secretAccessKey📜
Type: string
""
Description: Specify AWS Secret Access Key file ##
externalSecretsConfiguration.enabled📜
Type: bool
false
externalSecretsConfiguration.secretList[0].name📜
Type: string
""
externalSecretsConfiguration.secretList[0].namespace📜
Type: string
""
externalSecretsConfiguration.secretList[0].refreshInterval📜
Type: string
"1m"
externalSecretsConfiguration.secretList[0].secrets.targetName📜
Type: string
""
externalSecretsConfiguration.secretList[0].secrets.targetPolicy📜
Type: string
"Owner"
Description: target.creationPolicy default is Owner
externalSecretsConfiguration.secretList[0].secrets.secretKeyName📜
Type: object
key: ''
metadataPolicy: ''
property: ''
version: ''
Description: This name allows reference by other objects.
externalSecretsConfiguration.secretList[0].secrets.secretKeyName.key📜
Type: string
""
Description: Specify key here
externalSecretsConfiguration.secretList[0].secrets.secretKeyName.version📜
Type: string
""
Description: Key version
externalSecretsConfiguration.secretList[0].secrets.secretKeyName.property📜
Type: string
""
Description: Specify the property of the secret, i.e. username, password
externalSecretsConfiguration.secretList[0].secrets.secretKeyName.metadataPolicy📜
Type: string
""
Description: Optional” metadataPolicy for ExternalSecret, i.e. Fetch
upstream.nameOverride📜
Type: string
"external-secrets"
upstream.fullnameOverride📜
Type: string
"external-secrets"
upstream.installCRDs📜
Type: bool
false
upstream.deploymentAnnotations📜
Type: object
{}
upstream.webhook.create📜
Type: bool
false
upstream.rbac.create📜
Type: bool
false
upstream.certController.create📜
Type: bool
false
upstream.securityContext.allowPrivilegeEscalation📜
Type: bool
false
upstream.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.securityContext.enabled📜
Type: bool
true
upstream.securityContext.readOnlyRootFilesystem📜
Type: bool
true
upstream.securityContext.runAsNonRoot📜
Type: bool
true
upstream.securityContext.runAsUser📜
Type: int
1000
upstream.securityContext.runAsGroup📜
Type: int
1000
upstream.securityContext.seccompProfile.type📜
Type: string
"RuntimeDefault"
upstream.resources.requests.memory📜
Type: string
"256Mi"
upstream.resources.requests.cpu📜
Type: string
"100m"
upstream.resources.limits.cpu📜
Type: string
"100m"
upstream.resources.limits.memory📜
Type: string
"256Mi"
upstream.image.repository📜
Type: string
"registry1.dso.mil/ironbank/opensource/external-secrets/external-secrets"
upstream.image.pullPolicy📜
Type: string
"IfNotPresent"
upstream.image.tag📜
Type: string
"v0.19.0"
Description: The image tag to use. The default is the chart appVersion.
upstream.imagePullSecrets[0].name📜
Type: string
"private-registry"