-
Notifications
You must be signed in to change notification settings - Fork 880
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Openstack Barbican KMS support #1651
Comments
@rochaporto had created #683 back then, but what was missing (and still is) in this comment:
I think from our side (CERN community), we've found other solutions, but I agree that in general this would still be useful to have. |
From my side we've moved away from this solution long ago. There are still people using sops but with a vault backend. But most are using vault directly, with secret retrieval at deployment time with plugins for templating. |
Mind going into some more detail on your solution? We're building a multi-cloud (different providers due to regulations) k8s cluster setup, and want a solution that is as cloud provider agnostic as possible. |
Sure. We're relying on a central ArgoCD deployment with a plugin hooking to the argocd-vault-plugin (https://argocd-vault-plugin.readthedocs.io/en/stable/howitworks/), the config is something like:
The placeholders in the app values.yaml then look like:
We have a similar plugin for kustomize, just running The main difference to SOPS is that the secrets are not committed so not part of the versioned app state, and added when doing reconciliation/sync. |
Hello there!
Would there be interest in upstreaming 3d67bf1 (coming from main...clelange:sops:master)?
As an Openstack user, I would greatly benefit from using SOPS with Barbican in FluxCD.
Cheers!
(Tagging @clelange and @rochaporto, as they are the original authors)
The text was updated successfully, but these errors were encountered: