Configuration secretsΒΆ
Some of the configuration values are considered secrets, and cannot be saved in plain text format. We recommend using SealedSecrets or one of the other secret management system for Kubernetes, to encrypt the secret values.
As an alternative, we can pull secret values from Kubernetes secrets.
First, define an environment variable that is taken from a Kubernetes secret.
In your generated_values.yaml
file add:
runner:
additional_env_vars:
- name: GRAFANA_KEY
valueFrom:
secretKeyRef:
name: my-robusta-secrets
key: secret_grafana_key
Next, define that the value should be pulled from an environment variable by using the special {{ env.VARIABLE }} syntax:
globalConfig:
grafana_api_key: "{{ env.GRAFANA_KEY }}"
grafana_url: http://grafana.namespace.svc
Finally, create a Kubernetes secret named my-robusta-secrets
, and in it secret_grafana_key
with your grafana api key.
Values can be taken from environment variables in:
global config
playbooks action parameters
sinks configuration