-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for external secrets #1
Comments
If you're using external-secrets it's possible to merge the secrets together with values from AWS Secrets manager. apiVersion: external-secrets.io/v1beta1
kind: ExternalSecret
metadata:
name: burpsuite-enterprise-server-secret
namespace: burpsuite
spec:
dataFrom:
- extract:
conversionStrategy: Default
decodingStrategy: None
key: service/burpsuite/database
refreshInterval: 1h
secretStoreRef:
kind: ClusterSecretStore
name: default
target:
creationPolicy: Owner
deletionPolicy: Retain
template:
data:
BSEE_ADMIN_REPOSITORY_PASSWORD: '{{ .password }}'
BSEE_ADMIN_REPOSITORY_URL: jdbc:postgresql://{{ .host }}:{{ .port }}/{{ .dbname}}
BSEE_ADMIN_REPOSITORY_USERNAME: '{{ .username }}'
BSEE_AGENT_REPOSITORY_PASSWORD: '{{ .password }}'
BSEE_AGENT_REPOSITORY_URL: jdbc:postgresql://{{ .host }}:{{ .port }}/{{ .dbname}}
BSEE_AGENT_REPOSITORY_USERNAME: '{{ .username }}'
engineVersion: v2
mergePolicy: Merge
|
Hello, it's a bit unclear - how to refer to these secrets in the helm chart if it requires them in plain text? |
I don't understand the question 😊 |
So, we have all the credentials like BSEE_ADMIN_REPOSITORY_PASSWORD/BSEE_AGENT_REPOSITORY_PASSWORD stored in vault. ESO creates secrets in k8s - how to refer thme inside helm chart ? Secret is there (in k8s) but we can't pass it like this: Because we don't have DATABASE_ENTERPRISE_SERVER_PASSWORD secret string in helm values or in IaC configuration. So how to use ESO secrets ? |
Don't pass the secret values when doing template:
data:
DATABASE_ENTERPRISE_SERVER_PASSWORD: '{{ .password }}'
in the example above Exactly what {
"dbClusterIdentifier": "burpsuite-cluster",
"password": "asdasdasd",
"dbname": "burpsuite",
"engine": "postgres",
"port": 5432,
"host": "burpsuite-cluster..asdasdasdrds.amazonaws.com",
"username": "burpsuite"
}
So i can easily extract the password using |
Hello team,
many teams use external secrets in kubernetes, for example BSSE admin password is stored in AWS secret manager and is fetched via vault/ESO or similar tool to kubernetes.
Currently, it's not possible to insert reference to the existing secret like this:
- name: BSEE_AGENT_REPOSITORY_PASSWORD
valueFrom:
secretKeyRef:
name: {{ .Values.database.scanningResourcePasswordSecret.name }}
key: {{ .Values.database.scanningResourcePasswordSecret.key }}
Please, improve helm templates and values to support existing secrets in k8s.
The text was updated successfully, but these errors were encountered: