External-secrets runs within your Kubernetes cluster as a deployment resource. It utilizes CustomResourceDefinitions to configure access to secret providers through SecretStore resources and manages Kubernetes secret resources with ExternalSecret resources.
This tutorial is intended for those who already have the PreRequisites complete. If there is a term that you don't comprehend, we suggest you to take a look at the Glossary for a general understanding.
Note: The minimum supported version of Kubernetes is
1.16.0. Users still running Kubernetes v1.15 or below should upgrade to a supported version before installing external-secrets.
The default install options will automatically install and manage the CRDs as part of your helm release. If you do not want the CRDs to be automatically upgraded and managed, you must set the installCRDs option to false. (e.g. --set installCRDs=false)
You can install those CRDs outside of helm using:
kubectl apply -k "https://raw.githubusercontent.com/external-secrets/external-secrets/<replace_with_your_version>/deploy/crds/bundle.yaml"
Uncomment the relevant line in the next steps to disable the automatic install of CRDs.
helm repo add external-secrets https://charts.external-secrets.io
helm install external-secrets \
external-secrets/external-secrets \
-n external-secrets \
--create-namespace \
# --set installCRDs=false
Build and install the Helm chart locally after cloning the repository.
make helm.build
helm install external-secrets \
./bin/chart/external-secrets.tgz \
-n external-secrets \
--create-namespace \
# --set installCRDs=false
echo -n 'KEYID' > ./access-key
echo -n 'SECRETKEY' > ./secret-access-key
kubectl create secret generic awssm-secret --from-file=./access-key --from-file=./secret-access-key
Create a file 'basic-secret-store.yaml' with the following content.
{% include 'basic-secret-store.yaml' %}
Apply it to create a SecretStore resource.
kubectl apply -f "basic-secret-store.yaml"
Create a file 'basic-external-secret.yaml' with the following content.
{% include 'basic-external-secret.yaml' %}
Apply it to create an External Secret resource.
kubectl apply -f "basic-external-secret.yaml"
kubectl describe externalsecret example
# [...]
Name: example
Status:
Binding:
Name: secret-to-be-created
Conditions:
Last Transition Time: 2021-02-24T16:45:23Z
Message: Secret was synced
Reason: SecretSynced
Status: True
Type: Ready
Refresh Time: 2021-02-24T16:45:24Z
Events: <none>
For more advanced examples, please read the other guides.
External-secrets can be managed by Operator Lifecycle Manager (OLM) via an installer operator. It is made available through OperatorHub.io, this installation method is suited best for OpenShift. See installation instructions on the external-secrets-operator package.
Before continuing, ensure that all external-secret resources that have been created by users have been deleted. You can check for any existing resources with the following command:
kubectl get SecretStores,ClusterSecretStores,ExternalSecrets --all-namespaces
Once all these resources have been deleted you are ready to uninstall external-secrets.
Uninstall the helm release using the delete command.
helm delete external-secrets --namespace external-secrets