Use Kubernetes secrets in the immuta-values.yaml file instead of passwords and tokens. The following section demonstrates how to create a secret and reference it in the Helm values file.
Create secret
Create a file named secret-data.env with the following content.
# auditELASTICSEARCH_USERNAME=<elasticsearch-username>ELASTICSEARCH_PASSWORD=<elasticsearch-password># PostgreSQL connection string used by audit for the metadata database# postgresql://<user>:<password>@<postgres-fqdn>:5432/<database>?schema=audit## More info# https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-CONNSTRINGDATABASE_CONNECTION_STRING=postgresql://immuta:<postgres-password>@<postgres-fqdn>:5432/immuta?schema=audit# secureIMMUTA_DATABASES_IMMUTA_CONNECTIONS_IMMUTADB_PASSWORD=<postgres-password>
Create secret named immuta-secret from file secret-data.env.