A Helm plugin that manages secrets using Git workflows and integrates with cloud secret managers.
helm-secrets is a Helm plugin that helps manage secrets for Kubernetes deployments. It allows users to encrypt Helm value files with sops for secure Git storage and integrates with cloud secret managers like AWS Secrets Manager and Azure KeyVault. The plugin solves the problem of securely handling sensitive data in Helm charts while maintaining automation and GitOps practices.
DevOps engineers, SREs, and platform teams deploying applications with Helm in Kubernetes environments, especially those adopting GitOps workflows with tools like ArgoCD.
Developers choose helm-secrets because it seamlessly integrates secret management into existing Helm workflows, supports multiple backends and cloud providers, and enables secure, automated deployments without compromising on GitOps principles.
A helm plugin that help manage secrets with Git workflow and store them anywhere
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Uses sops to encrypt Helm value files, allowing safe storage in Git repositories, which is explicitly designed for GitOps workflows as shown in the README's emphasis on Git-centric secret management.
Directly references secrets from AWS Secrets Manager, Azure KeyVault, and HashiCorp Vault, enabling dynamic injection without manual steps, as detailed in the Cloud Integration section.
Integrates seamlessly with ArgoCD via protocol handlers like secrets://, supporting automated deployments in GitOps pipelines, with examples provided in the ArgoCD Integration wiki.
Evaluates vals expressions inside Helm templates with the --evaluate-templates flag, allowing dynamic secret references, as demonstrated in the README for Helm 3.9+ and vals 0.20+.
The plugin command mode is noted as 'slow on multiple value files' in the README, which can degrade deployment speed in complex charts with numerous secret files.
Requires installing and configuring external tools like sops or vals, along with managing encryption keys or cloud credentials, adding significant initial setup effort beyond Helm itself.
Integration with Terraform is cumbersome, relying on external data sources due to the Helm provider's lack of downloader plugin support, as admitted in the Terraform support section.