Skip to content

Using an existing Kubernetes Secret for Harbor internal database password with Helm & ArgoCD #2217

@morganbasset

Description

@morganbasset

Hi,

I'm deploying Harbor using GitOps with ArgoCD and the official Helm chart.

I would like to define the internal database password using a pre-existing Kubernetes Secret, rather than storing the password directly in my values.yaml, which is versioned in Git.

I noticed that the _helpers.tpl template (specifically harbor.database.rawPassword) appears to support reading the password from an existing secret. However, the chart still creates the -database secret during deployment, which ends up overwriting the one I create beforehand.

Is there a recommended way to disable the creation of the database secret when providing it externally, or a better approach to securely reference an existing secret for the internal database password?

Thanks in advance!

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions