freeleaps-ops/freeleaps-secret-operator/helm-pkg/secret-operator/templates/NOTES.txt
zhenyus c42f249e9f feat(helm): add helm package codes for secret operator
Signed-off-by: zhenyus <zhenyus@mathmast.com>
2025-08-18 11:24:07 +08:00

40 lines
1.4 KiB
Plaintext

Thank you for installing {{ .Chart.Name }}.
Your release is named {{ .Release.Name }}.
To learn more about the release, try:
$ helm status {{ .Release.Name }}
$ helm get all {{ .Release.Name }}
The operator has been deployed with the following configuration:
{{- if .Values.operator.watchedNamespaces }}
- Watching namespaces: {{ .Values.operator.watchedNamespaces }}
{{- else }}
- Watching all namespaces
{{- end }}
- Leader election enabled: {{ .Values.operator.leaderElection.enabled }}
- Debug mode: {{ .Values.operator.debug }}
- API Server Port: {{ .Values.operator.apiServerPort }}
{{- if .Values.metrics.enabled }}
Metrics are enabled and can be accessed via service:
$ kubectl port-forward svc/{{ include "freeleaps-secret-operator.fullname" . }}-metrics {{ .Values.metrics.service.port }}:{{ .Values.metrics.service.port }}
Then visit http://localhost:{{ .Values.metrics.service.port }}/metrics
{{- end }}
{{- if .Values.azureKeyVault.createSecret }}
Azure Key Vault configuration has been created as a Kubernetes Secret.
{{- else if .Values.azureKeyVault.existingSecret }}
Using existing Azure Key Vault configuration from secret: {{ .Values.azureKeyVault.existingSecret }}
{{- end }}
{{- if or .Values.jwt.createSecret .Values.jwt.existingSecret }}
JWT configuration is properly configured.
{{- end }}
{{- if or .Values.hmac.createSecret .Values.hmac.existingSecret }}
HMAC configuration is properly configured.
{{- end }}