You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/deploy-applications/hello-world-adding-configurations.mdx
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,31 +1,31 @@
1
1
---
2
-
id: add-secrets-with-vault
3
-
title: Add Secrets with Vault
2
+
id: manage-environment-secrets
3
+
title: Manage Environment Secrets
4
4
type: tutorial
5
5
---
6
6
7
-
# Add Secrets with Vault
7
+
# Manage Environment Secrets
8
8
9
9
:::caution prerequisite
10
10
You must have a running app from the [Deploy Your First App](deploy-first-app) tutorial before continuing.
11
11
:::
12
12
13
-
In this guide, you'll learn how to store sensitive values in Vault and inject them into your application as environment variables. Instead of hardcoding secrets in your deployment configuration, you'll use an **ExternalSecret** that automatically syncs values from Vault into your Kubernetes pod.
13
+
In this guide, you'll learn how to store sensitive values in an encrypted store and inject them into your application as environment variables. Instead of hardcoding secrets in your deployment configuration, you'll use an **ExternalSecret** that automatically syncs values from your secret store into your Kubernetes pod.
14
14
15
15
We'll add a new secret alongside the `GREETING_MESSAGE` you set up in the previous tutorial.
16
16
17
-
## 1. Create a secret in Vault
17
+
## 1. Create a secret
18
18
19
19
:::info
20
-
Your cluster information page has a link to Vault:
20
+
Your cluster information page has a link to the Encrypted Secret Store:
_If the domain above doesn't look right, update your **Captain Domain** in the top navigation bar._
24
24
:::
25
25
26
-
From the cluster info home page, click the `Link` for **Secrets Management** to open Vault. For the role, enter **editor** (you need read/write access), then click **Sign in with OIDC Provider**.
26
+
From the cluster info home page, click the `Link` for **Secrets Management** to open the secret store. For the role, enter **editor** (you need read/write access), then click **Sign in with OIDC Provider**.
- `externalSecret.enabled: true` turns on the ExternalSecret integration.
96
96
- `secrets.hello-world`creates an ExternalSecret named after your app.
97
-
- `dataFrom.key: secret/hello-world` tells it to pull **all** key-value pairs from the Vault path `secret/hello-world` and inject them as environment variables.
97
+
- `dataFrom.key: secret/hello-world` tells it to pull **all** key-value pairs from the secret path `secret/hello-world` and inject them as environment variables.
98
98
99
-
The `GREETING_MESSAGE` from `envVariables` remains unchanged — it's a static value defined in your config. The Vault secret (`SECRET_MESSAGE`) is injected alongside it automatically.
99
+
The `GREETING_MESSAGE` from `envVariables` remains unchanged — it's a static value defined in your config. The secret (`SECRET_MESSAGE`) is injected alongside it automatically.
100
100
:::
101
101
102
102
## 3. Deploy
@@ -108,20 +108,20 @@ Commit the changes and push. ArgoCD will sync the update in ~3 minutes.
108
108
Visit <CaptainDomainLink to="https://hello-world-prod.apps.{domain}/?env=true" /> and look for both:
109
109
110
110
- `GREETING_MESSAGE=Hello, World!`— your static environment variable
111
-
- `SECRET_MESSAGE=This value came from Vault!`— injected from Vault via ExternalSecret
111
+
- `SECRET_MESSAGE=This value came from your Secret Store!`— injected via ExternalSecret
112
112
113
113
:::tip
114
-
If the Vault secret doesn't appear immediately, give it a moment — the ExternalSecret controller refreshes every few seconds. You can also check the ExternalSecret resource status in the ArgoCD dashboard.
114
+
If the secret doesn't appear immediately, give it a moment — the ExternalSecret controller refreshes every few seconds. You can also check the ExternalSecret resource status in the ArgoCD dashboard.
115
115
:::
116
116
117
117
## Key concepts
118
118
119
119
| Concept | Description |
120
120
|---------|-------------|
121
-
| **ExternalSecret** | A Kubernetes resource that syncs secrets from an external provider (Vault) into a Kubernetes Secret. |
122
-
| **`dataFrom`** | Pulls all key-value pairs from a Vault path — no need to list each key individually. |
121
+
| **ExternalSecret** | A Kubernetes resource that syncs secrets from an external provider (e.g. OpenBao) into a Kubernetes Secret. |
122
+
| **`dataFrom`** | Pulls all key-value pairs from a secret path — no need to list each key individually. |
123
123
| **`envVariables`** | Static env vars defined directly in your values file. Good for non-sensitive config. |
124
-
| **Vault** | The secrets management system. Secrets are stored at paths like `secret/hello-world`. |
124
+
| **OpenBao** | The secrets management system. Secrets are stored at paths like `secret/hello-world`. |
Copy file name to clipboardExpand all lines: docs/deploy-applications/traefik/middleware-basicauth.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,5 +183,6 @@ stringData:
183
183
- The Secret must be in the same namespace as the Middleware (`nonprod`)
184
184
185
185
:::caution
186
-
The credentials in this example are stored in plain text in your values file. For production use, consider using [ExternalSecrets](https://external-secrets.io/) to pull credentials from a secrets manager like AWS Secrets Manager or HashiCorp Vault.
186
+
The credentials in this example are stored in plain text in your values file.
187
+
:::consider using ExternalSecrets resources to pull credentials from our secret store.
Copy file name to clipboardExpand all lines: src/components/about-glueops.tsx
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ const callouts: Callout[] = [
46
46
},
47
47
{
48
48
title: "Encrypted Secret Management",
49
-
text: "Ensure security with an encrypted secret store for confidential values, including seamless integration with popular options like AWS Secrets Manager.",
49
+
text: "Ensure security with an encrypted secret store for confidential values, including seamless integration with popular options like OpenBao.",
0 commit comments