Requirements:
- You should have Kubernetes properly installed.
- You should have the
kubectl
tool installed.- Follow the installation steps provided in the Getting started - External Secrets Operator documentation.
Configuration in the Segura
- Create an Access policy in the DSM.
- Create a Secret in Segura.
- Create an Application in Segura.
- Create an Authorization for the newly created application.
- Add the Secret to the Authorization of the application.
- Copy the values of the Client ID and Client Secret fields from the application's authorization.
- Create a file with the
.yml
extension in Kubernetes. - Fill in the
.yml
file with the Client ID and Client Secret values you copied earlier. - Execute the following command:
kubectl apply -f nomedoarquivo.ymlc
In Kubernetes, follow the steps in the Segura documentation on External Secrets, available at Segura DevOps Secrets Management (DSM).
By following these steps, the integration between DSM and Kubernetes via External Secrets will be configured, guaranteeing secure and effective management of the sensitive information needed to operate your environment
Validate the integration
To validate the intregration, you can use on of the following commands:
Command | Description |
---|---|
kubectl get externalsecret -o wide |
Check the synchronization status. |
kubectl describe externalsecret example-secret |
Check the synchronization status. |
kubectl get pods -A |
Check the Pod creation. |
kubectl get secrets/example-secret -n namespace -o yaml |
Check the External Secrets contents. |
kubectl get secrets/example-secret -o yaml |
Check if the synchronized secret has been created and that the data has been retrieved. |
kubectl logs -f pod/external-secrets-<CHANGEME> -n external-secrets |
Check the External Secrets logs. |
Do you still have questions? Reach out to the Segura Community.