You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To automatically install and manage the CRDs as part of your helm release, you must add the `--set installCRDs=true` flag to your helm installation command.
43
-
Uncomment the relevant line in the next steps to enable this.
42
+
Run the command below to deploy the External Secrets application in your cluster and create its associated resources.
43
+
To automatically install and manage the CRDs as part of your Helm release, you must add the `--set installCRDs=true` flag to your Helm installation command.
44
+
Uncomment the `--set installCRDs=true` line in the following command to do so.
Define a `SecretStore` resource in Kubernetes to inform External Secrets where to fetch secrets from.
62
64
Secret Manager is a regionalized product so you will need to specify the [region](/identity-and-access-management/secret-manager/concepts/#region) to create your secret in.
63
65
64
-
```
65
-
---
66
-
apiVersion: external-secrets.io/v1beta1
67
-
kind: SecretStore
68
-
metadata:
69
-
name: secret-store
70
-
namespace: default
71
-
spec:
72
-
provider:
73
-
scaleway:
74
-
region: <REGION>
75
-
projectId: <SCALEWAY_PROJECT_ID>
76
-
accessKey:
77
-
secretRef:
78
-
name: scwsm-secret
79
-
key: access-key
80
-
secretKey:
81
-
secretRef:
82
-
name: scwsm-secret
83
-
key: secret-access-key
84
-
```
66
+
1. Copy the template below and paste it in a file named `secret-store.yaml`.
67
+
68
+
```
69
+
---
70
+
apiVersion: external-secrets.io/v1beta1
71
+
kind: SecretStore
72
+
metadata:
73
+
name: secret-store
74
+
namespace: default
75
+
spec:
76
+
provider:
77
+
scaleway:
78
+
region: <REGION>
79
+
projectId: <SCALEWAY_PROJECT_ID>
80
+
accessKey:
81
+
secretRef:
82
+
name: scwsm-secret
83
+
key: access-key
84
+
secretKey:
85
+
secretRef:
86
+
name: scwsm-secret
87
+
key: secret-access-key
88
+
```
89
+
2. Apply your file to your cluster:
90
+
91
+
```
92
+
kubectl apply -f secret-store.yaml
93
+
```
85
94
86
95
## Create your first External Secret
87
96
88
-
```
89
-
---
90
-
apiVersion: external-secrets.io/v1beta1
91
-
kind: ExternalSecret
92
-
metadata:
93
-
name: secret
94
-
namespace: default
95
-
spec:
96
-
refreshInterval: 20s
97
-
secretStoreRef:
98
-
kind: SecretStore
99
-
name: secret-store
100
-
target:
101
-
name: kubernetes-secret-to-be-created
102
-
creationPolicy: Owner
103
-
data:
104
-
- secretKey: password # key in the kubernetes secret
105
-
remoteRef:
106
-
key: id:<SECRET_ID in the secret store>
107
-
version: latest_enabled
108
-
```
97
+
Create an `ExternalSecret` resource to specify which secret to fetch from Secret Manager.
98
+
1. Copy the following template and paste it in a file named `external-secret.yaml`
99
+
100
+
```
101
+
---
102
+
apiVersion: external-secrets.io/v1beta1
103
+
kind: ExternalSecret
104
+
metadata:
105
+
name: secret
106
+
namespace: default
107
+
spec:
108
+
refreshInterval: 20s
109
+
secretStoreRef:
110
+
kind: SecretStore
111
+
name: secret-store
112
+
target:
113
+
name: kubernetes-secret-to-be-created
114
+
creationPolicy: Owner
115
+
data:
116
+
- secretKey: password # key in the kubernetes secret
117
+
remoteRef:
118
+
key: id:<SECRET_ID in the secret store>
119
+
version: latest_enabled
120
+
```
121
+
2. Apply the file to your cluster:
122
+
```
123
+
kubectl apply -f external-secret.yaml
124
+
```
109
125
110
126
A secret with the name `kubernetes-secret-to-be-created` should appear in your namespace. It contains the secret pulled from Secret Manager:
Make sure you have deleted all external-secret resources you might have created beforehand. You can check for any existing resources with the following command:
136
+
Make sure you have deleted any resources created by External Secrets beforehand. You can check for any existing resources with the following command:
121
137
122
138
```
123
139
kubectl get SecretStores,ClusterSecretStores,ExternalSecrets,ClusterExternalSecret,PushSecret --all-namespaces
124
140
```
125
141
126
-
Once all these resources have been deleted you are ready to uninstall external-secrets.
142
+
Once all these resources have been deleted you are ready to uninstall External Secrets.
127
143
128
-
## Uninstalling with helm
144
+
## Uninstalling with Helm
129
145
130
-
Uninstall the helm release using the following command.
146
+
Uninstall the External Secrets deployment using the following command.
0 commit comments