Sync secrets from the Cloak Encrypted Secrets Platform to Kubernetes using the External Secrets Operator.
Cloak uses the webhook provider built into the External Secrets Operator but also required a proxy service to handle decrypting secrets when they arrive into your cluster.
From the Cloak user interface create a service account and store the private key on your file system.
Now create a kubernetes secret in the same namespace as the External Secrets Operator.
HISTIGNORE='*kubectl*' kubectl --namespace=external-secrets \
create secret generic cloak-key \
--from-file=ecdh_private_key=$LOCATION_OF_YOUR_PEM_FILE
{% include 'cloak-proxy-deployment.yaml' %}
And a Kubernetes Service so External Secrets Operator can access the proxy.
{% include 'cloak-proxy-service.yaml' %}
You can now place the configuration in any Kubernetes Namespace.
{% include 'cloak-secret-store.yaml' %}
Each secretKey reference in the yaml should point to the name of the secret as it is stored in Cloak.
{% include 'cloak-external-secret.yaml' %}
