Skip to content

Secrets Operator Helm chart values

This page provides key Helm chart values and environment variable reference for Aembit Secrets Operator: Aembit Secrets Operator is a Kubernetes operator that authenticates to the Aembit platform and synchronizes credentials into Kubernetes Secrets for applications to consume directly.Learn more (ASO). The chart name is aembit-secrets-operator (version 1.31.314).

Default aembit/aembit-secrets-operator

Container image repository.


Default Chart appVersion

Image tag. Defaults to the chart’s appVersion if empty.


Default IfNotPresent

Image pull policy. Use IfNotPresent (default) or Always for production. Use Never for local development with kind/minikube (requires pre-loaded image).


Default []

Image pull secrets for private registries.

Default false

Enable host attestation passthrough. Requires hostPath volume mounts and a Pod Security Admission profile of baseline or privileged.


Default /run/aembit/host_attestations.json

Path on the host to the attestations file.


Default /run/aembit/host_attestations.json

Mount path within the Secrets Operator pod. Must match the attestations.host.passthroughPath in your AembitEdgeApiClient resource.

Default 1m

Retry interval after the first reconciliation error.


Default 15m

Maximum retry interval for exponential backoff.

Default 1

Number of Secrets Operator replicas.


Default 500m

CPU resource limit.


Default 128Mi

Memory resource limit.


Default 10m

CPU resource request.


Default 64Mi

Memory resource request.


Default info

Log level: debug, info, warn, error, off. Use debug only for troubleshooting in non-production environments.


Default 8081

Port for health probes.

Default true

Require non-root user.


Default 65532

UID for the Secrets Operator process.


containerSecurityContext.readOnlyRootFilesystem

Section titled “containerSecurityContext.readOnlyRootFilesystem”

Default true

Read-only root filesystem.


containerSecurityContext.allowPrivilegeEscalation

Section titled “containerSecurityContext.allowPrivilegeEscalation”

Default false

Prevent privilege escalation.

Default {}

Node selector for pod scheduling.


Default []

Tolerations for pod scheduling.


Default {}

Affinity rules for pod scheduling.


Default []

Topology spread constraints for pod distribution.


Default true

Enable PodDisruptionBudget. Only takes effect when replicaCount > 1.


Default 1

Minimum available pods during voluntary disruptions.


Default not set

Maximum number of pods that can be unavailable during voluntary disruptions. Mutually exclusive with podDisruptionBudget.minAvailable — set one or the other, not both.

Default true

Create the Role, RoleBinding, ClusterRole, and ClusterRoleBinding resources required by Secrets Operator. Set to false when you manage RBAC out of band (for example, via GitOps with a separate security team).

Default true

Create a ServiceAccount for the Secrets Operator pod. Set to false to use an existing ServiceAccount you manage out of band.


Default ""

Name of the ServiceAccount. Defaults to the chart’s full name when empty. When serviceAccount.create is false, set this to the name of your existing ServiceAccount.


Default {}

Annotations applied to the ServiceAccount. Common uses include AWS IAM Roles for Service Accounts (IRSA) (eks.amazonaws.com/role-arn) and GCP Workload Identity (iam.gke.io/gcp-service-account) to federate the in-cluster ServiceAccount to a cloud IAM identity.

Default {}

Additional annotations applied to the Secrets Operator pod. Common uses include Istio sidecar injection (sidecar.istio.io/inject), Prometheus scrape config, and secret-store Container Storage Interface (CSI) driver annotations.


Default {}

Additional labels applied to the Secrets Operator pod. Useful for selector matching by network policies, service meshes, and observability tooling.


Default []

Additional environment variables for the Secrets Operator container. Accepts the standard Kubernetes EnvVar schema, including valueFrom.secretKeyRef and valueFrom.configMapKeyRef.


Default []

Additional volumes attached to the Secrets Operator pod. Pair with extraVolumeMounts when using a projected ServiceAccount token at a custom path. See the attestations.kubernetesServiceAccount.tokenPath field on AembitEdgeApiClient.


Default []

Additional volume mounts for the Secrets Operator container. Pair with extraVolumes to mount external content into the pod, such as a projected ServiceAccount token at a custom path.