Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/geritol/secret-backup-operator
Kubernetes operator for backing up secrets
https://github.com/geritol/secret-backup-operator
kubernetes kubernetes-operator kubernetes-secrets
Last synced: 2 months ago
JSON representation
Kubernetes operator for backing up secrets
- Host: GitHub
- URL: https://github.com/geritol/secret-backup-operator
- Owner: geritol
- License: mit
- Created: 2020-05-04T05:31:33.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2023-02-12T12:18:25.000Z (almost 2 years ago)
- Last Synced: 2024-05-22T14:31:57.596Z (8 months ago)
- Topics: kubernetes, kubernetes-operator, kubernetes-secrets
- Language: JavaScript
- Size: 291 KB
- Stars: 13
- Watchers: 4
- Forks: 3
- Open Issues: 8
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Secret backup operator
An operator to backup secrets on a Kubernetes cluster.
Backup happens when secrets are modified.
Backup data is stored in an other secret `-backup`, that has a single key `BACKUP` containing the secrets versions in a JSON encoded list.## Setup
To be able to run this on a cluster you need to deploy a Deployment that runs an image built using the provided `Dockerfile`, the pods need to run with a `ServiceAccount` that is authorized to create, read, watch and edit secrets. Eg.:
```yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: secret-operator-service-account
namespace: some-namepace
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: secret-reader
rules:
- apiGroups: [""]
resources: ["secrets"]
verbs: ["get", "watch", create", "update", "patch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: read-secrets
namespace: default
subjects:
- kind: ServiceAccount
name: secret-operator-service-account
namespace: some-namepace
roleRef:
kind: ClusterRole
name: secret-reader
apiGroup: rbac.authorization.k8s.io
```