Skip to content

Commit 914ea1e

Browse files
refactor(docs): article on deploying secret moved to cluster docs
1 parent fee6caf commit 914ea1e

File tree

1 file changed

+1
-22
lines changed

1 file changed

+1
-22
lines changed

docs/operations/deploy-secret.md

Lines changed: 1 addition & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,3 @@
11
# Deploy a secret
22

3-
## Prerequisites
4-
5-
Install the `kubeseal` client command on your local workstation from the latest stable release: <https://github.com/bitnami-labs/sealed-secrets/releases>
6-
7-
## Configure public certificate
8-
9-
Place the public URL for the target cluster's sealed secret's certificate into the `SEALED_SECRETS_CERT` environment variable:
10-
11-
```bash
12-
export SEALED_SECRETS_CERT=https://sealed-secrets.live.k8s.phl.io/v1/cert.pem
13-
```
14-
15-
## Encrypt secrets to cluster repository
16-
17-
Create a Kubernetes `Secret` manifest containing one or more key+value pair, and then use the `kubeseal` client to encrypt it into a `SealedSecret` manifest. The target namespace must be provided and will become part of the encryption such that the secret can only be loaded into that namespace. Commit the sealed secret to the cluster's repository under the path `code-for-philly/helm-chart/templates/secrets/` where it will become part of the deployed helm chart:
18-
19-
```bash
20-
kubeseal \
21-
--namespace code-for-philly \
22-
-f mysecret.yaml \
23-
-w ~/Repositories/cfp-live-cluster/code-for-philly/helm-chart/templates/secrets/mysecret.yaml
24-
```
3+
See <https://codeforphilly.github.io/cfp-live-cluster/development/features/sealed-secrets/>

0 commit comments

Comments
 (0)