Introduce Kubernetes ClusterSecret
Global inter-namespace cluster secrets - Secrets that work across namespaces - Clusterwide secrets
ClusterSecret operator makes sure all the matching namespaces have the secret available. New namespaces, if they match the pattern, will also have the secret. Any change on the ClusterSecret will update all related secrets. Deleting the ClusterSecret deletes "child" secrets (all cloned secrets) too.
Here is how it looks like:
Kind: ClusterSecret
apiVersion: clustersecret.io/v1
metadata:
namespace: clustersecret
name: default-wildcard-certifiate
matchNamespace:
- prefix_ns-*
- anothernamespace
avoidNamespaces:
- supersecret-ns
data:
tls.crt: BASE64
tls.key: BASE64
Use it for certificates, registry pulling credentials and so on.
when you need a secret in more than one namespace. you have to:
1- Get the secret from the origin namespace. 2- Edit the the secret with the new namespace. 3- Re-create the new secret in the new namespace.
This could be done with one command:
kubectl get secret <secret-name> -n <source-namespace> -o yaml \
| sed s/"namespace: <source-namespace>"/"namespace: <destination-namespace>"/\
| kubectl apply -n <destination-namespace> -f -
Clustersecrets automates this. It keep track of any modification in your secret and it will also react to new namespaces.
kubectl apply -f ./yaml
To instal ClusterSecret operator we need to create (in this order):
- RBAC resources (avoid if you are not running RBAC) to allow the operator to create/update/patch secrets: yaml/00_
- Custom resource definition for the ClusterSecret resource: yaml/01_crd.yaml
- The ClusterSecret operator itself: yaml/02_deployment.yaml
create a ClusterSecret object yaml like the one above, or in the example in yaml/Object_example/obj.yaml and apply it in your cluster kubectl apply -f yaml/Object_example/obj.yaml
The ClusterSecret operator will pick it up and will create the secret in every matching namespace: match matchNamespace
but not matching avoidNamespaces
RegExp's.
You can specify multiple matching or non-matching RegExp. By default it will match all, same as defining matchNamespace = *
$> kubectl get csec -n clustersecret
NAME TYPE
global-secret
apiVersion: clustersecret.io/v1
kind: ClusterSecret
metadata:
name: global-secret
namespace: my-fav-namespce
data:
username: MTIzNDU2Cg==
password: Nzg5MTAxMTIxMgo=
This can be archived by changing the RBAC. You may want to replace https://github.com/zakkg3/ClusterSecret/blob/master/yaml/00_rbac.yaml#L43-L46 for a new namespaced role and its correspondient rolebinding.
Here is the official doc: https://kubernetes.io/docs/reference/access-authn-authz/rbac/
NOTE: in debug mode object data (the secret) are sent to stdout, potentially logs are being collected by Loki / Elasticsearch or any log management platform -> Not for production!.
Overwirte deployment entrypoint (Kubernetes command
) from kopf run /src/handlers.py
to kopf run /src/handlers.py --verbose
For development you dont want to build/push/recreate pod every time. Instead we can run the operator locally:
Once you have the config in place (kubeconfig) you can just install the requirementes (pip install /base-image/requirements.txt) and then run the operator from your machine (usefull for debbuging.)
kopf run ./src/handlers.py --verbose
Make sure to have the proper RBAC in place (k apply -f yaml/00_rbac.yaml
) and also the CRD definition (k apply -f yaml/01_crd.yaml
)
-
[] implement
source
to specify a source secret to sync instead ofdata
field. (zakkg3#3) -
set type of secret (ie tls)
-
[] set annotations and labels
- [] on_resume we have to refresh memory ("csec" touple). More info in docs/roadmap.md
If you need support, start with the troubleshooting guide: Run it in debug mode. You can open issues and we will try to address them.
That said, if you have questions, or just want to establish contact, reach out to us one way or another. https://flag5.com