- Removed instructions for accessing metrics via port-forwarding as metrics are no longer enabled by default. - This change simplifies the deployment notes for the secret operator. Signed-off-by: zhenyus <zhenyus@mathmast.com>
33 lines
1.1 KiB
Plaintext
33 lines
1.1 KiB
Plaintext
Thank you for installing {{ .Chart.Name }}.
|
|
|
|
Your release is named {{ .Release.Name }}.
|
|
|
|
To learn more about the release, try:
|
|
|
|
$ helm status {{ .Release.Name }}
|
|
$ helm get all {{ .Release.Name }}
|
|
|
|
The operator has been deployed with the following configuration:
|
|
{{- if .Values.operator.watchedNamespaces }}
|
|
- Watching namespaces: {{ .Values.operator.watchedNamespaces }}
|
|
{{- else }}
|
|
- Watching all namespaces
|
|
{{- end }}
|
|
- Leader election enabled: {{ .Values.operator.leaderElection.enabled }}
|
|
- Debug mode: {{ .Values.operator.debug }}
|
|
- API Server Port: {{ .Values.operator.apiServerPort }}
|
|
|
|
{{- if .Values.azureKeyVault.createSecret }}
|
|
|
|
Azure Key Vault configuration has been created as a Kubernetes Secret.
|
|
{{- else if .Values.azureKeyVault.existingSecret }}
|
|
Using existing Azure Key Vault configuration from secret: {{ .Values.azureKeyVault.existingSecret }}
|
|
{{- end }}
|
|
|
|
{{- if or .Values.jwt.createSecret .Values.jwt.existingSecret }}
|
|
JWT configuration is properly configured.
|
|
{{- end }}
|
|
|
|
{{- if or .Values.hmac.createSecret .Values.hmac.existingSecret }}
|
|
HMAC configuration is properly configured.
|
|
{{- end }} |