# Secret Template # Copy this file to secret.yaml and fill in the actual values # DO NOT commit secret.yaml to git! # # To create the secret: # kubectl create secret generic turash-backend-secret \ # --from-file=secret.yaml \ # --namespace=turash \ # --dry-run=client -o yaml | kubectl apply -f - # # Or use sealed-secrets, external-secrets, or your preferred secret management solution apiVersion: v1 kind: Secret metadata: name: turash-backend-secret namespace: turash labels: app: turash-backend component: secret type: Opaque stringData: # JWT Secret - MUST be changed in production! JWT_SECRET: "CHANGE_ME_TO_STRONG_RANDOM_SECRET" # PostgreSQL Credentials POSTGRES_USER: "turash" POSTGRES_PASSWORD: "CHANGE_ME_STRONG_PASSWORD" # Neo4j Credentials NEO4J_PASSWORD: "CHANGE_ME_STRONG_PASSWORD" # Redis Password (if required) REDIS_PASSWORD: "CHANGE_ME_STRONG_PASSWORD" # Ollama Credentials (optional) OLLAMA_USERNAME: "" OLLAMA_PASSWORD: "" # Google Maps API Key (optional) GOOGLE_KG_API_KEY: "" GOOGLE_CLOUD_PROJECT_ID: ""