Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Integrate External Secrets Operator and HashiCorp Vault #13

Open
d3adb5 opened this issue Apr 2, 2024 · 0 comments
Open

Integrate External Secrets Operator and HashiCorp Vault #13

d3adb5 opened this issue Apr 2, 2024 · 0 comments
Labels
enhancement New feature or request

Comments

@d3adb5
Copy link
Owner

d3adb5 commented Apr 2, 2024

Create a SecretStore or multiple such resources that allows syncing Kubernetes built-in Secrets with data stored in HashiCorp Vault.

The External Secrets Operator has been deployed already in c00ffb4, and is maintained through the Operator Lifecycle Manager. The CRDs should therefore be in place, we just need to configure Kubernetes authentication on Vault and add the necessary service accounts. This may or may not be done on a case by case basis to limit the secrets each service account can read.

Current known use cases:

  • When integrating services with SSO, a client ID and client secret are made necessary and should be stored in a secret.
  • Terraform is likely to make its way into this repository (it has been written and is in use), we can deploy Atlantis and mount things like AWS credentials through external secrets.
  • Should this repository or any others turn private for whatever reason, GitHub credentials for Argo CD can be stored in Vault.
@d3adb5 d3adb5 added the enhancement New feature or request label Apr 2, 2024
@d3adb5 d3adb5 added this to Cloud Lab Apr 2, 2024
@d3adb5 d3adb5 moved this to Backlog in Cloud Lab Apr 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
Status: Backlog
Development

No branches or pull requests

1 participant