You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As part of installing by using the script `pattern.sh` pattern, HashiCorp Vault is installed. the load-secrets makefile target. Running `./pattern.sh make install` also calls the `load-secrets` makefile target. This `load-secrets` target looks for a yaml file describing the secrets to be loaded into vault and in case it cannot find one it will use the `values-secret.yaml.template` file in the git repo to try and generate random secrets.
247
+
As part of installing by using the script `pattern.sh` pattern, HashiCorp Vault is installed. Running `./pattern.sh make install` also calls the `load-secrets` makefile target. This `load-secrets` target looks for a yaml file describing the secrets to be loaded into vault and in case it cannot find one it will use the `values-secret.yaml.template` file in the git repo to try and generate random secrets.
248
248
249
249
For more information, see section on https://validatedpatterns.io/secrets/vault/[Vault].
250
250
@@ -276,7 +276,7 @@ Verify that the *config-demo* application deployed successfully as follows:
276
276
+
277
277
[source,terminal]
278
278
----
279
-
Hub Cluster domain is 'apps.ci-ln-b7ib8bt-76ef8.aws-2.ci.openshift.org'
280
-
Pod is running on Local Cluster Domain 'apps.ci-ln-b7ib8bt-76ef8.aws-2.ci.openshift.org'
279
+
Hub Cluster domain is 'apps.aws-hub-cluster.openshift.org'
280
+
Pod is running on Local Cluster Domain 'apps.aws-hub-cluster.openshift.org'
Copy file name to clipboardExpand all lines: content/learn/getting-started-secret-management.adoc
+23-10Lines changed: 23 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ As of December 12, 2023, ESO is not officially supported by Red Hat as a product
45
45
46
46
ESO's custom file format and utilities streamlines secret management by allowing file references and supporting encrypted secret storage. The design prioritizes security through multi-layer encryption and simplifies key management. In particular the ini key type is especially helpful for handling AWS credentials, where mismanagement could lead to unauthorized use and potential financial or operational issues.
47
47
48
-
Validated Patterns primary backend secret store is HashiCorp Vault It acts as a centralized service for securely managing secrets, such as passwords, API keys, and certificates.
48
+
Validated Patterns primary backend secret store is HashiCorp Vault. HashiCorp Vault acts as a centralized service for securely managing secrets, such as passwords, API keys, and certificates.
49
49
50
50
Unlike other secret management systems tied to specific cloud providers for example AWS Secrets Manager or Azure Key Vault, Vault can be deployed across different clouds, on bare-metal systems, and in hybrid environments. This cross-platform support made it a popular and practical choice for maintaining a consistent secrets management strategy.
51
51
@@ -81,7 +81,7 @@ $ cd <repository-name>
81
81
+
82
82
[source,terminal]
83
83
----
84
-
$ vi <repository-name>
84
+
$ git checkout -b mysecret
85
85
----
86
86
87
87
. Edit the existing `~/values-secret-multicloud-gitops.yaml`
@@ -106,6 +106,7 @@ secrets:
106
106
onMissingValue: generate
107
107
----
108
108
109
+
109
110
. Load the secrets into the Vault by running the following command:
110
111
+
111
112
[source,terminal]
@@ -125,40 +126,46 @@ secrets:
125
126
126
127
.. Add the modified file to your Git repository:
127
128
+
129
+
[source,terminal]
128
130
----
129
131
$ git add -u
130
132
----
131
133
132
134
.. Commit your changes:
133
135
+
136
+
[source,terminal]
134
137
----
135
-
$ git commit -m "Added mysecret-external-secret to create mysecret-secret in config-demo"
138
+
$ git commit -m "Adding a Secret to Multicloud GitOps Patternn in config-demo"
136
139
----
137
140
138
141
.. Push your branch to the origin of your fork:
139
142
+
143
+
[source,terminal]
140
144
----
141
145
$ git push origin mysecret
142
146
----
143
147
144
-
=== Creating a new External Secret in OpenShift GitOps
148
+
=== Creating a new external secret in OpenShift GitOps
145
149
146
150
Follow these steps to create and deploy a new external secret in your GitOps repository.
147
151
148
152
. Navigate to the `charts/all/config-demo/templates` directory in your repository:
149
153
+
154
+
[source,terminal]
150
155
----
151
156
$ cd charts/all/config-demo/templates
152
157
----
153
158
154
159
. Create a new YAML file named `mysecret-external-secret.yaml`:
0 commit comments