Use existent secrets for sensitive variables in values.yaml for compatibility with ArgoCD #64
Unanswered
Mmoncadaisla
asked this question in
Q&A
Replies: 1 comment 3 replies
-
I've transferred the original discussion from the eoapi repo to here. Maybe @ranchodeluxe or @Rub21 might have an answer for you! |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Context
After some initial review of
eoAPI
via local deployment we decided to go one step further and deploy it to our cluster.We are on Google Kubernetes Engine (GKE) and leverage ArgoCD for application deployment, using Kubeseal for sensitive information via SealedSecrets. I'm myself no expert on the matter at all, but trying to get familiar with STAC, the
eoapi
ecosystem and its deployment configurations.Ultimately, we aim to leverage an existent PostgreSQL database for
pgstac
that leverages the Cloud Native PG operator, and which for unfortunate reasons lives within a different GKE cluster and region in the same Google Cloud project.Question
Apologies in advance if the following question is quite basic: from the
values.yaml
file it looks like some variables are intended to be passed upon helm install or helm template commands. Since we're using ArgoCD, we intended to pre-create the secrets and reference those in thevalues.yaml
file.For example, in other applications we were able to use the following pattern:
So the question is: what is the recommended approach to inject these variables in a secure way that works with ArgoCD and allow us to pre-create the SealedSecrets that expand to Kubernetes Secrets in advance?
Additional information
ArgoCD application manifest
Beta Was this translation helpful? Give feedback.
All reactions