-
Notifications
You must be signed in to change notification settings - Fork 2
[DPE-1435] install external secret manager with helm #71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
Question for discussion : should these operators be deployed as part of individual services or cluster wide? Edit: NVM - is this to store secrets that argocd uses during deployment? |
Yes. I need to add my secrets to the AWS secret manager and based on the documentation here, we could either configure a "seal" secret or an External Secrets Operator. |
…dd a env variable in PR run in spacelift to skip it for now
|
🎉 All dependencies have been resolved ! |
Problem:
Related to: https://sagebionetworks.jira.com/browse/DPE-1435
I want to add my fork repository to argo CD to deploy amp-als. When I deployed argocd locally, I added my fork repo using:
and then modify argoCD configMap by hand. But the process of creating secrets and modifying configMap couldn't be tracked by Github.
Since we install argoCD through helm, I could try:
To populate the
github-app-creds Secretin the argocd namespace, I can either create it manually using the command line as shown above, or manage it declaratively through the External Secrets Operator.Depends on #72
Solution:
Testing: