Sealed Secrets lets you store the Kubernetes secrets encrypted. The encrypted secrets can only be decrypted by the controller running in the target cluster.
Sealed Secrets is composed of two parts:
A cluster-side controller / operator
A client-side utility: kubeseal
The kubeseal utility uses asymmetric crypto to encrypt secrets that only the controller can decrypt.
These encrypted secrets are encoded in a SealedSecret resource.
You will create a cluster blueprint with "Sealed Secrets" addon
You will then apply this cluster blueprint to a managed cluster
Deploy a sample application with a sealed secret leveraging cluster overrides to multiple clusters
Important
This tutorial describes the steps to create and use a Sealed Secrets based blueprint using the Web Console. The entire workflow can also be fully automated and embedded into an automation pipeline.
Now, we are ready to apply this blueprint to a cluster or multiple clusters.
Click on Options for the target Cluster in the Web Console
Select "Update Blueprint" and select the "standard-blupeint" blueprint from the dropdown and for the version select "v1" from the dropdown.
Click on "Save and Publish".
This will start the deployment of the addons configured in the "standard-blueprint" blueprint to the targeted cluster. The blueprint sync process can take a few minutes. Once complete, the cluster will display the current cluster blueprint details and whether the sync was successful or not.
Now that we have the Sealed secrets running in the cluster, we can encrypt the secrets using kubeseal client.
To do this, kubeseal client needs access to the cluster to fetch the certificate every time you need to encrypt the secret.
In this example we will be using wordpress application to deploy to 2 clusters (demo-cluster-1,demo-cluster-2) by encrypting the secrets required by wordpress using Sealed Secrets.
You can also get the certificate from the cluster and store it in your local disk using the below command:
kubeseal --fetch-cert > sealed-secrets-cert.pem
Lets encrypt the below k8s secrets for wordpress using kubeseal.
We will be using the cluster name as the secret name in this example.
Replace the highlighted lines below with your cluster name and namespace name where you want to deploy the application into.
Write the above contents to a file called wordpress-secret-demo-cluster-1.yaml and wordpress-secret-demo-cluster-2.yaml respectively.
To encrypt the secret, we will use kubeconfig so kubeseal can talk to the cluster to fetch the certificate for encryption.
To download kubeconfig, we will use rctl.
To download kubeconfig for demo-cluster-1, use below command:
Navigate to Applications -> Workloads in the Web Console
Under Infrastructure, select "Namespaces" and create a new namespace called "demo"
Publish this namespace to clusters "demo-cluster-1" and "demo-cluster-2"
Select "New Workload" -> "Create New Workload"
Type "demo-cluster-1-wordpress-secret" for Name and Select "k8s YAML" for the package type
Select "Upload Manually" for the artifact sync
Select "demo" for the namespace
Upload the sealed secret for demo-cluster-1 and publish this workload to cluster "demo-cluster-1"
Select "New Workload" -> "Create New Workload"
Type "demo-cluster-2-wordpress-secret" for Name and Select "k8s YAML" for the package type
Select "Upload Manually" for the artifact sync
Select "demo" for the namespace
Upload the sealed secret for demo-cluster-2 and publish this workload to cluster "demo-cluster-2"
Once the Sealed Secret controller unseals this, you will see that Secret got created in the demo namespace.
kubectl get secrets -n demo
NAME TYPE DATA AGE
demo-cluster-1 Opaque 5 6m
Step 6.3 Prepare custom values file for wordpress so that we can use the secrets created by sealed secrets controller¶
Below is a custom values file where ".global.Rafay.ClusterName" will be replaced with the cluster name, workload is getting deployed to by the controller.
We will be using the cluster-name for the secret name, ingress hostname.
Verifying the wordpress deployment on cluster "demo-cluster-1"
kubectl get po -n demo
NAME READY STATUS RESTARTS AGE
wordpress-7488799d7b-v2nzr 1/1 Running 0 27m
wordpress-mariadb-0 1/1 Running 0 26m
kubectl get ing -n demo
NAME CLASS HOSTS ADDRESS PORTS AGE
wordpress nginx wordpress.demo-cluster-1.demo.gorafay.net 172.20.249.38 80 27m
Verifying the wordpress deployment on cluster "demo-cluster-2"
kubectl get po -n demo
NAME READY STATUS RESTARTS AGE
wordpress-bdd4b48cd-wfpcd 1/1 Running 0 27m
wordpress-mariadb-0 1/1 Running 0 26m
kubectl get ing -n demo
NAME CLASS HOSTS ADDRESS PORTS AGE
wordpress nginx wordpress.demo-cluster-2.demo.gorafay.net 172.20.111.245 80 27m
You will need to setup dns entries for the wordpress hostnames pointing to the clusters on how ingress was exposed.
Then you will be able to access the wordpress application using the ingress hostnames.
Note
Sealed secrets has the following scopes:
- strict (default): the secret must be sealed with exactly the same name and namespace. These attributes become part of the encrypted data and thus changing name and/or namespace would lead to "decryption error".
- namespace-wide: you can freely rename the sealed secret within a given namespace.
- cluster-wide: the secret can be unsealed in any namespace and can be given any name.