I have a terraform project that sits in a github repository, it will deploy a helm chart via running "terraform apply". So we define a helm_release as following.
Basically our helm chart that sits in another separate repository. When we release a helm chart version, we package helm charts into a tgz file and push it to google cloud artifactory registry.
As following helm_release, we provide repository url and chart version, then terraform can pull down our helm charts.
resource "helm_release" "somexxxx" {
count = var.install_somexxxx_helm_release ? 1 : 0
# Chart information.
repository = var.somexxxx_repository
version = var.somexxxx_version
chart = "somexxxx"
name = "somexxxx"
......
}
由于我们在头盔图中贴上了某些硬性规定,例如,我们使用“头盔”把档案加密为秘密。 yaml, Secrets. 亚穆埃尔人坐在海图中,坐在海图亚穆伦,因此属于秘密。 还将对Yaml进行包装,推动Google登记处。
现在,在地形图中,我们使用以下代码来解密。 yaml, I refer it from 。
data "external" "helm-secrets" {
program = ["helm", "secrets", "decrypt", "--terraform", "secrets.yaml"]
}
当我管理“地形”时,我在管理头盔时出现错误,就抱怨“没有烟雾秘密”。
显然,地形图发现秘密。 yaml,我认为我们提供了一种不正确的档案秘密途径。 yaml.
我的问题是,当梯田从古角登记处 down下我的海图时,我的头盔的夹子是什么? 如果我知道我大约xxxx的头部,那么我知道秘密的位置。 yaml.
我正在 st,对此有什么想法? 我赞赏你的帮助。