You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Helm chart can automatically generate secrets with random passwords for both development and production environments. This removes the need to create secrets manually during initial setup. You can enable this feature during installation by setting `--set global.secrets.autoGenerated=true`.
180
-
181
-
### Important limitations
182
-
183
-
The auto-generated secret uses Helm hooks (`pre-install`) with a `keep` resource policy. This means:
184
-
185
-
- The secret is created before the main Helm release installation.
186
-
- The secret is not managed by later Helm operations (upgrade, rollback, uninstall).
187
-
- If you delete the secret, generated passwords are lost permanently.
188
-
- The secret becomes orphaned from the Helm release lifecycle.
189
-
190
-
### Configuring components to use auto-generated secrets
191
-
192
-
Enabling `global.secrets.autoGenerated: true` only creates the secret with random values. You must configure each component to reference the auto-generated secret by name and key. The key can be custom, but the name must match the definition above.
For details on Identity secrets during installation, see the [installation guide](/self-managed/deployment/helm/install/quick-install.md#create-identity-secrets).
205
-
206
178
## Document Store secrets
207
179
208
180
Document Store secrets use the structured `secret:` pattern with separate secret configurations for each credential component.
@@ -292,7 +264,7 @@ You can use a single consolidated secret (e.g., app-credentials) or one secret p
292
264
293
265
### Find any plaintext secrets in your `values.yaml`
294
266
295
-
#### A - If the secrets already exist in Kubernetes (e.g. autogenerated via chart)
267
+
#### A - If the secrets already exist in Kubernetes
296
268
297
269
You can read the current (base64-encoded) data from existing secrets and reuse it in your new consolidated secret.
0 commit comments