External Secrets
- 1 minute to read
- Print
- DarkLight
- PDF
External Secrets
- 1 minute to read
- Print
- DarkLight
- PDF
Article Summary
Share feedback
Thanks for sharing your feedback!
DSM integration with Kubernetes through External Secrets
Requirements
Kubernetes installed
kubectl installed
Follow the installation steps in this documentation: Guides getting started
Follow the creation and configuration steps in this documentation: Provider senhasegura DSM
In senhasegura
Create an Access Group in DSM
Create a Secret in senhasegura
Create an Application on senhasegura
Create an Application Authorization for the created application
Add the Secret in the Application Authorization
Copy the value of the Client ID and Client Secret fields of Application Authorization
Create a file with the .yml extension in Kubernetes
Fill in the Client ID and Client Secret in the .yml file
Run the command
kubectl apply -f nomedoarquivo.yml
In Kubernetes, follow the steps in this documentation
Validation
- Check the synchronization status:
kubectl get externalsecret -o wide
kubectl describe externalsecret example-secret
- Check if the pod was created:
kubectl get pods -A
- Check the content of the external secret:
kubectl get secrets/example-secret -n namespace -o yaml
Troubleshooting
- Check whether the synchronized secret was created and the data obtained:
kubectl get secrets/example-secret -o yaml
- Consult external secrets logs:
kubectl logs -f pod/external-secrets-<CHANGEME> -n external-secrets
Was this article helpful?