Use sealed secrets in crossplane(kubernetes) manifests #1332
Replies: 1 comment
-
Old issue, but one I've recently faced. If the control plane cluster has the sealed secret tls certificate that's been used to seal your secrets, you can copy the certificate from the control plane to the target cluster using the kubernetes crossplane provider. I used a Composition to create a cluster, configure the helm provider, install sealed secrets using helm and configure the crossplane Kubernetes provider then copy the sealed secret certificate like this:
Note the namespace - this needs to be the same namespace that sealed secrets was installed to. I then used the kuberetes provider to install a sealed secret (in this case github credentials for argo)
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I am working on crossplane composition to provision a cluster and install argocd in it. To configure argocd to monitor my private git repository I need to create a secret in that cluster? Here, I want to use sealed secrets. But I don't understand how I can create a sealed secret using kubeseal if the cluster itself isn't created by me? Since the cluster itself is created by me I cannot use kubeseal in that cluster to create the sealed secrets manifest.
How do I automate this flow?
Beta Was this translation helpful? Give feedback.
All reactions