Skip to content

Allow Secret to be mapped from Azure Secrets Vault #186

Open
@batpad

Description

@batpad

For our work with IFRC, we are required to store all secrets in Azure Secrets Vault and the pattern we use on other deploys, is to use a SecretProviderClass to map these secrets to a k8s Secret object. For eg. https://github.com/IFRCGo/montandon-etl/blob/develop/helm/templates/config/secrets_provider_class.yaml

For our eoapi-k8s deploy, we want to use Azure Managed Postgres, and then pass the credentials for the database in this way.

To make this work, I would:

This is a bit cloud-provider specific, but of course, you'd be able to totally ignore it if you are not using Azure / Keyvault. Am not sure, but perhaps other cloud providers have similar ways to map secrets from a "vault" to a k8s Secret object, and we can add those conditionals down the line if it seems useful.

This is all seems a bit non-ideal, but this seems like one way to unblock us.

Would love to hear any thoughts / concerns, @pantierra @emmanuelmathot @ividito @geohacker

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions