Skip to content

Commit

Permalink
Update docs/external_secrets.md
Browse files Browse the repository at this point in the history
Co-authored-by: Alexander VanTol <[email protected]>
  • Loading branch information
EliseCastle23 and Avantol13 authored Mar 4, 2024
1 parent 4f69cf3 commit de399c0
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/external_secrets.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ create_iam_user
Our Helm architecture includes a comprehensive [umbrella](https://github.com/uc-cdis/gen3-helm/tree/master/helm/gen) chart designed to streamline the deployment of external secrets across both the umbrella chart itself and its associated subcharts. By configuring the `.Values.global.externalSecrets.deploy` setting within this umbrella chart, users can effortlessly initiate the deployment of all related external secret resources. This includes the external secret resources within the subcharts and the secret store required for their management.

#### Global Deployment of External Secrets
Upon deployment of the umbrella chart, the .Values.global.externalSecrets.deploy setting automatically provisions external secret resources for every subchart. This occurs regardless of the individual external secrets deployment settings within subcharts, even if they are explicitly set to false. This feature ensures a unified approach to secret management across all components of the architecture.
Upon deployment of the umbrella chart, the `.Values.global.externalSecrets.deploy` setting automatically provisions external secret resources for every subchart. This occurs regardless of the individual external secrets deployment settings within subcharts, even if they are explicitly set to `false`. This feature ensures a unified approach to secret management across all components of the architecture.

#### Selective Secret Management
For users requiring a more selective application of external secrets — targeting specific secrets while excluding others — the system is designed to accommodate such scenarios with ease.
Expand Down

0 comments on commit de399c0

Please sign in to comment.