Skip to content

Commit c4cf1a2

Browse files
fix: docs (#365)
fix: remove AWS secrets manager ref since we do not support that fix: adding antonios feedback/PR
1 parent a349bcb commit c4cf1a2

6 files changed

Lines changed: 22 additions & 21 deletions

File tree

docs/deploy-applications/hello-world-adding-configurations.mdx

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,31 @@
11
---
2-
id: add-secrets-with-vault
3-
title: Add Secrets with Vault
2+
id: manage-environment-secrets
3+
title: Manage Environment Secrets
44
type: tutorial
55
---
66

7-
# Add Secrets with Vault
7+
# Manage Environment Secrets
88

99
:::caution prerequisite
1010
You must have a running app from the [Deploy Your First App](deploy-first-app) tutorial before continuing.
1111
:::
1212

13-
In this guide, you'll learn how to store sensitive values in Vault and inject them into your application as environment variables. Instead of hardcoding secrets in your deployment configuration, you'll use an **ExternalSecret** that automatically syncs values from Vault into your Kubernetes pod.
13+
In this guide, you'll learn how to store sensitive values in an encrypted store and inject them into your application as environment variables. Instead of hardcoding secrets in your deployment configuration, you'll use an **ExternalSecret** that automatically syncs values from your secret store into your Kubernetes pod.
1414

1515
We'll add a new secret alongside the `GREETING_MESSAGE` you set up in the previous tutorial.
1616

17-
## 1. Create a secret in Vault
17+
## 1. Create a secret
1818

1919
:::info
20-
Your cluster information page has a link to Vault:
20+
Your cluster information page has a link to the Encrypted Secret Store:
2121
<CaptainDomainLink to="https://cluster-info.{domain}" />
2222

2323
_If the domain above doesn't look right, update your **Captain Domain** in the top navigation bar._
2424
:::
2525

26-
From the cluster info home page, click the `Link` for **Secrets Management** to open Vault. For the role, enter **editor** (you need read/write access), then click **Sign in with OIDC Provider**.
26+
From the cluster info home page, click the `Link` for **Secrets Management** to open the secret store. For the role, enter **editor** (you need read/write access), then click **Sign in with OIDC Provider**.
2727

28-
![Vault Login](https://cdn.glueops.dev/doc-assets/v1/openbao/openbao-login-with-editor.png)
28+
![Secret Store Login](https://cdn.glueops.dev/doc-assets/v1/openbao/openbao-login-with-editor.png)
2929

3030
Once logged in, select the **secret/** mount point.
3131

@@ -39,7 +39,7 @@ Enter the details for your secret:
3939

4040
- **Path for this secret:** Use your app name (e.g., `hello-world`)
4141
- **Key:** `SECRET_MESSAGE` (case sensitive)
42-
- **Value:** `This value came from Vault!`
42+
- **Value:** `This value came from your Secret Store!`
4343

4444
![Add Secret Details](https://cdn.glueops.dev/doc-assets/v1/openbao/create-secret.png)
4545

@@ -94,9 +94,9 @@ externalSecret:
9494
:::info How it works
9595
- `externalSecret.enabled: true` turns on the ExternalSecret integration.
9696
- `secrets.hello-world` creates an ExternalSecret named after your app.
97-
- `dataFrom.key: secret/hello-world` tells it to pull **all** key-value pairs from the Vault path `secret/hello-world` and inject them as environment variables.
97+
- `dataFrom.key: secret/hello-world` tells it to pull **all** key-value pairs from the secret path `secret/hello-world` and inject them as environment variables.
9898

99-
The `GREETING_MESSAGE` from `envVariables` remains unchanged — it's a static value defined in your config. The Vault secret (`SECRET_MESSAGE`) is injected alongside it automatically.
99+
The `GREETING_MESSAGE` from `envVariables` remains unchanged — it's a static value defined in your config. The secret (`SECRET_MESSAGE`) is injected alongside it automatically.
100100
:::
101101

102102
## 3. Deploy
@@ -108,20 +108,20 @@ Commit the changes and push. ArgoCD will sync the update in ~3 minutes.
108108
Visit <CaptainDomainLink to="https://hello-world-prod.apps.{domain}/?env=true" /> and look for both:
109109

110110
- `GREETING_MESSAGE=Hello, World!` — your static environment variable
111-
- `SECRET_MESSAGE=This value came from Vault!` — injected from Vault via ExternalSecret
111+
- `SECRET_MESSAGE=This value came from your Secret Store!` — injected via ExternalSecret
112112

113113
:::tip
114-
If the Vault secret doesn't appear immediately, give it a moment — the ExternalSecret controller refreshes every few seconds. You can also check the ExternalSecret resource status in the ArgoCD dashboard.
114+
If the secret doesn't appear immediately, give it a moment — the ExternalSecret controller refreshes every few seconds. You can also check the ExternalSecret resource status in the ArgoCD dashboard.
115115
:::
116116

117117
## Key concepts
118118

119119
| Concept | Description |
120120
|---------|-------------|
121-
| **ExternalSecret** | A Kubernetes resource that syncs secrets from an external provider (Vault) into a Kubernetes Secret. |
122-
| **`dataFrom`** | Pulls all key-value pairs from a Vault path — no need to list each key individually. |
121+
| **ExternalSecret** | A Kubernetes resource that syncs secrets from an external provider (e.g. OpenBao) into a Kubernetes Secret. |
122+
| **`dataFrom`** | Pulls all key-value pairs from a secret path — no need to list each key individually. |
123123
| **`envVariables`** | Static env vars defined directly in your values file. Good for non-sensitive config. |
124-
| **Vault** | The secrets management system. Secrets are stored at paths like `secret/hello-world`. |
124+
| **OpenBao** | The secrets management system. Secrets are stored at paths like `secret/hello-world`. |
125125

126126
## Next steps
127127

docs/deploy-applications/hello-world.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,5 +115,5 @@ Look for `GREETING_MESSAGE=Hello, World!` in the output.
115115

116116
## Next steps
117117

118-
- [Add Secrets with Vault](add-secrets-with-vault) — Pull sensitive configuration from Vault instead of hardcoding values.
118+
- [Add Secrets](manage-environment-secrets) — Pull sensitive configuration from your secret store instead of hardcoding values.
119119
- [Traefik Ingress & Routing](/traefik-ingress) — Explore advanced routing patterns: path-based routing, middleware, rate limiting, and more.

docs/deploy-applications/ingress/ingress-annotations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
id: glueops-ingress-and-loadbalancer-customizations
3-
title: Ingress Annotations
3+
title: "`ingress-nginx` Annotations"
44
---
55

66

docs/deploy-applications/traefik/middleware-basicauth.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,5 +183,6 @@ stringData:
183183
- The Secret must be in the same namespace as the Middleware (`nonprod`)
184184

185185
:::caution
186-
The credentials in this example are stored in plain text in your values file. For production use, consider using [ExternalSecrets](https://external-secrets.io/) to pull credentials from a secrets manager like AWS Secrets Manager or HashiCorp Vault.
186+
The credentials in this example are stored in plain text in your values file.
187+
:::consider using ExternalSecrets resources to pull credentials from our secret store.
187188
:::

sidebars.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ const sidebars = {
2626
collapsible: true,
2727
items: [
2828
"deploy-applications/deploy-first-app",
29-
"deploy-applications/add-secrets-with-vault",
29+
"deploy-applications/manage-environment-secrets",
3030
"deploy-applications/ingress/glueops-ingress-and-loadbalancer-customizations",
3131
{
3232
type: "category",

src/components/about-glueops.tsx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ const callouts: Callout[] = [
4646
},
4747
{
4848
title: "Encrypted Secret Management",
49-
text: "Ensure security with an encrypted secret store for confidential values, including seamless integration with popular options like AWS Secrets Manager.",
49+
text: "Ensure security with an encrypted secret store for confidential values, including seamless integration with popular options like OpenBao.",
5050
icon: ShareIcon,
5151
},
5252
{

0 commit comments

Comments
 (0)