1
0
mirror of https://github.com/funkypenguin/geek-cookbook/ synced 2025-12-12 17:26:19 +00:00

Try to avoid parsing errors

Signed-off-by: David Young <davidy@funkypenguin.co.nz>
This commit is contained in:
David Young
2022-02-18 18:00:18 +13:00
parent 6987a67f78
commit cf1645dd2f
4 changed files with 11 additions and 2 deletions

View File

@@ -107,6 +107,7 @@ Now that the "global" elements of this deployment (*just the HelmRepository in t
### ConfigMap
{% raw %}
Now we're into the sealed-secrets-specific YAMLs. First, we create a ConfigMap, containing the entire contents of the helm chart's [values.yaml](https://github.com/bitnami-labs/sealed-secrets/blob/main/helm/sealed-secrets/values.yaml). Paste the values into a `values.yaml` key as illustrated below, indented 4 tabs (*since they're "encapsulated" within the ConfigMap YAML*). I create this in my flux repo at `sealed-secrets/configmap-sealed-secrets-helm-chart-value-overrides.yaml`:
??? example "Example ConfigMap (click to expand)"
@@ -466,6 +467,7 @@ Now you're ready to seal some secrets!
### Sealing a secret
To generate sealed secrets, we need the public key that the controller has generated. On a host with a valid `KUBECONFIG` env var, pointing to a kubeconfig file with cluster-admin privileges, run the following to retrieve the public key for the sealed secrets (*this is the public key, it doesn't need to be specifically protected*)
{% endraw %}
```bash
kubeseal --fetch-cert \

View File

@@ -0,0 +1,3 @@
# Harbor
harbor

View File

@@ -0,0 +1 @@
# Istio with Harbor

View File

@@ -207,8 +207,11 @@ nav:
# - Dashboard: kubernetes/wip.md
# - Kured: kubernetes/wip.md
# - KeyCloak: kubernetes/wip.md
# - Recipes:
# - GitHub Actions Runners: kubernetes/wip.md
- Recipes:
- Harbor:
- recipes/kubernetes/harbor/index.md
Istio: recipes/kubernetes/harbor/istio.md
# - GitHub Actions Runners: kubernetes/wip.md
# - Cilium: kubernetes/wip.md
# - Concourse: kubernetes/wip.md
# - Flagger: kubernetes/wip.md