You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc-site/docs/components/kubernetes/external-secrets.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ sidebar_position: 3
5
5
---
6
6
7
7
## Overview
8
-
Kubernetes External Secrets allows you to use external secret management systems, like AWS Secrets Manager or HashiCorp Vault, to securely add secrets in Kubernetes.
8
+
Kubernetes External Secrets allows you to use external secret management systems, like AWS Secrets Manager or HashiCorp Vault, to securely add secrets in Kubernetes.
9
9
10
10
## How it works
11
11
The project extends the Kubernetes API by adding an ExternalSecrets object using Custom Resource Definition and a controller to implement the behavior of the object itself.
@@ -16,7 +16,7 @@ An ExternalSecret declares how to fetch the secret data, while the controller co
16
16
Along with the database credentials, any other secrets that need to be provided to the application can be managed in AWS Secrets Manager.
17
17
Secrets have been created for each environment called `<project-name>/kubernetes/<environment>/<project-name>` which contain a list of environment variables that will be synced with the kubernetes secret in your namespace via a tool called [external-secrets](https://github.com/external-secrets/kubernetes-external-secrets)
18
18
Any secrets managed by `external-secrets` will be synced to kubernetes every 15 seconds. Keep in mind that any changes must be made in Secrets Manager, as any that are made to the secret on the kubernetes side will be overwritten.
19
-
You can see the `external-secrets` configuration in [kubernetes/overlays/staging/external-secret.yml](https://github.com/commitdev/zero-deployable-backend/blob/main/templates/kubernetes/overlays/staging/external-secret.yml) (this is the one for staging)
19
+
You can see the `external-secrets` configuration in [kubernetes/overlays/staging/external-secret.yml](https://github.com/commitdev/zero-backend-go/blob/main/templates/kubernetes/overlays/staging/external-secret.yml) (this is the one for staging)
20
20
21
21
To work with the secret in AWS you can use the web interface or the cli tool:
22
22
```
@@ -28,4 +28,4 @@ The intent is that the last part of the secret name is the component of your app
28
28
## Documentation
29
29
Checkout [External secrets's documentation][docs] for more information.
0 commit comments