

These credentials can be provided in a number of ways, including: The secret-agent expects credentials to be discoverable via standard GCP mechanisms. Set up Cloud Backup With GCP Secret Manager Note: The maximum secret size supported by AWS is 65Kb For more information, see AWS documentation. Name: cloud-credentials namespace: test-sa data:ĪWS_ACCESS_KEY_ID: QU.GY= AWS_SECRET_ACCESS_KEY: cRB.BB= Once these credentials are posted to a Kubernetes secret, the next step is to configure the AWS Secret Manager using the SecretAgentConfiguration.įor example, the following configuration targets AWS Secret Manager in us-east-1:ĪpiVersion: v1 kind: Secret type: Opaque metadata: If this argument is omitted completely, the namespace will default to the namespace of each SAC. This target namespace can be changed by changing the runtime argument -cloud-secrets-namespace= located in the operator's manifest. In the default secret-agent deployment, the user is expected to publish the cloud credentials' secret in the same namespace as the operator. The secret reference is provided in the SAC in. This can be achieved by allowing access to the arn:aws:iam::aws:policy/SecretsManagerReadWrite AWS managed policy.Įven though the recommended way to obtain credentials is to use the EC2 Instance Metadata service, it is possible to provide custom credentials via a Kubernetes secret. The secret-agent needs to access read/write secrets.
#Secret agents names how to#
Refer to AWS documentation for instructions on how to obtain credentials and grant necessary permissions to access the AWS Secrets Manager. EC2 Instance Metadata (preferred): Obtains credentials from 169.254.169.254.Shared Configuration file: (~/.aws/config.Shared Credentials file: ~/.aws/credentials.Environment Variables: AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY.These credentials can be provided in a number of ways, for example: The secret-agent expects credentials to be discoverable via standard AWS mechanisms.

Set up Cloud Backup With AWS Secret Manager In order to fetch and store secrets in the AWS Secrets Manager, the user must provide credentials with the necessary permissions. This is useful if your applications can access the cloud secret manager directly and the secret-agent is only used to generate such secrets. In addition, it is possible to configure the secret-agent to store secrets in the secret manager without creating local Kubernetes secrets. This is only possible if is set to true. To disable cloud provider support, set to “none”. This is useful when debugging or testing applications. It is possible to run the secret-agent without setting up a cloud provider. The secret-agent supports the following cloud providers: The operator will only generate new secrets if no secret data is found in the cloud provider. If the secret is found in the cloud provider's secret manager, the operator will use the found data as the Kubernetes secret data. If a cloud provider has been configured, the operator will attempt to load the secret data from that cloud provider. When this feature is enabled, secrets stored in the secret managers are considered the source of truth. The secret-agent can be configured to back up all the generated secrets in a cloud provider's secret manager solution. If similar secrets are desired in multiple namespaces, one SAC would be required per namespace. It is important to note that the Kubernetes secrets produced by the secret-agent will be placed in the same namespace as the SAC. Kubectl create -f config/samples/secret-agent_v1alpha1_secretagentconfiguration.yaml

#Secret agents names install#
To install the latest secret-agent release in a Kubernetes environment, run: Backup and restore of Kubernetes secrets using cloud native technologies such as, or vendor provided backup services (Backup for GKE).Cert-manager is the defacto Kubernetes standard for certificate management. Direct integration with cloud secret management (GCP Secret Manager, Vault, etc.) using ForgeRock's commons secrets API.The longer term roadmap for platform secrets management is centered around: Secret agent was originally designed to fulfill a short term obective to create and manage secrets for the ForgeRock platform running on Kubernetes. Future updates will be limited to bug fixes. The secrets are stored in-cluster as Kubernetes secrets and can also be stored in a cloud secret manager. The secret-agent is a Kubernetes operator that generates the secrets required by the ForgeRock® Identity Platform.
#Secret agents names generator#
Secret-agent - Secret generator and manager for k8s
