keystone
OpenStack Identity service.
Deployment Scope
- Cluster scope: site
- Values key:
site.keystone - ArgoCD Application template:
charts/argocd-understack/templates/application-openstack-helm.yaml
How to Enable
Set this component to enabled in your deployment values file:
How ArgoCD Builds It
- ArgoCD renders Helm chart
keystoneand Kustomize pathcomponents/keystone/. - The shared site-level
secret-openstack.yamland optionalimages-openstack.yamlfiles are loaded before the service-specific values file. - The deploy repo contributes
values.yamlfor this component. - The deploy repo overlay directory for this component is applied as a second source, so
kustomization.yamland any referenced manifests are part of the final Application.
Deployment Repo Content
Use any secret delivery mechanism you prefer. The contract that matters is the final Kubernetes Secret or manifest shape described below.
Required or commonly required items:
values.yaml: Provide the Keystone-specific chart or manifest values.keystone-adminSecret: Providepasswordfor the admin or bootstrap account.keystone-db-passwordSecret: Provideusernameandpasswordfor the Keystone database user.keystone-rabbitmq-passwordSecret: Provideusernameandpasswordfor the messaging user Keystone should use.
Optional additions:
keystone-ssoSecret: Provideclient-id,client-secret, andissuerwhen Keystone uses OIDC or web SSO.sso-passphraseSecret: Provide the passphrase consumed by the SSO configuration when that flow is enabled.
Notes
- This service is rendered by
application-openstack-helm.yaml, which also reads the shared site-levelsecret-openstack.yamland optionalimages-openstack.yamlfiles before it readskeystone/values.yaml.