Kubernetes
External Secrets Operator allows to retrieve secrets from a Kubernetes Cluster - this can be either a remote cluster or the local one where the operator runs in.
A SecretStore
points to a specific namespace in the target Kubernetes Cluster. You are able to retrieve all secrets from that particular namespace given you have the correct set of RBAC permissions.
The SecretStore
reconciler checks if you have read access for secrets in that namespace using SelfSubjectRulesReview
. See below on how to set that up properly.
External Secret Spec
This provider supports the use of the Property
field. With it you point to the key of the remote secret. If you leave it empty it will json encode all key/value pairs.
apiVersion: external-secrets.io/v1beta1
kind: ExternalSecret
metadata:
name: database-credentials
spec:
refreshInterval: 1h
secretStoreRef:
kind: SecretStore
name: k8s-store # name of the SecretStore (or kind specified)
target:
name: database-credentials # name of the k8s Secret to be created
data:
- secretKey: username
remoteRef:
key: database-credentials
property: username
- secretKey: password
remoteRef:
key: database-credentials
property: password
# metadataPolicy to fetch all the labels and annotations in JSON format
- secretKey: tags
remoteRef:
metadataPolicy: Fetch
key: database-credentials
# metadataPolicy to fetch all the labels in JSON format
- secretKey: labels
remoteRef:
metadataPolicy: Fetch
key: database-credentials
property: labels
# metadataPolicy to fetch a specific label (dev) from the source secret
- secretKey: developer
remoteRef:
metadataPolicy: Fetch
key: database-credentials
property: labels.dev
find by tag & name
You can fetch secrets based on labels or names matching a regexp:
apiVersion: external-secrets.io/v1beta1
kind: ExternalSecret
metadata:
name: fetch-tls-and-nginx
spec:
refreshInterval: 1h
secretStoreRef:
kind: SecretStore
name: k8s-store
target:
name: fetch-tls-and-nginx
dataFrom:
- find:
name:
# match secret name with regexp
regexp: "tls-.*"
- find:
tags:
# fetch secrets based on label combination
app: "nginx"
Target API-Server Configuration
The servers url
can be omitted and defaults to kubernetes.default
. You have to provide a CA certificate in order to connect to the API Server securely.
For your convenience, each namespace has a ConfigMap kube-root-ca.crt
that contains the CA certificate of the internal API Server (see RootCAConfigMap
feature gate).
Use that if you want to connect to the same API server.
If you want to connect to a remote API Server you need to fetch it and store it inside the cluster as ConfigMap or Secret.
You may also define it inline as base64 encoded value using the caBundle
property.
apiVersion: external-secrets.io/v1beta1
kind: SecretStore
metadata:
name: k8s-store-default-ns
spec:
provider:
kubernetes:
# with this, the store is able to pull only from `default` namespace
remoteNamespace: default
server:
url: "https://myapiserver.tld"
caProvider:
type: ConfigMap
name: kube-root-ca.crt
key: ca.crt
Authentication
It's possible to authenticate against the Kubernetes API using client certificates, a bearer token or service account. The operator enforces that exactly one authentication method is used. You can not use the service account that is mounted inside the operator, this is by design to avoid reading secrets across namespaces.
NOTE: SelfSubjectRulesReview
permission is required in order to validation work properly. Please use the following role as reference:
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
namespace: default
name: eso-store-role
rules:
- apiGroups: [""]
resources:
- secrets
verbs:
- get
- list
- watch
- apiGroups:
- authorization.k8s.io
resources:
- selfsubjectrulesreviews
verbs:
- create
Authenticating with BearerToken
Create a Kubernetes secret with a client token. There are many ways to acquire such a token, please refer to the Kubernetes Authentication docs.
apiVersion: v1
kind: Secret
metadata:
name: my-token
data:
token: "...."
Create a SecretStore: The auth
section indicates that the type token
will be used for authentication, it includes the path to fetch the token. Set remoteNamespace
to the name of the namespace where your target secrets reside.
apiVersion: external-secrets.io/v1beta1
kind: SecretStore
metadata:
name: k8s-store-token-auth
spec:
provider:
kubernetes:
# with this, the store is able to pull only from `default` namespace
remoteNamespace: default
server:
# ...
auth:
token:
bearerToken:
name: my-token
key: token
Authenticating with ServiceAccount
Create a Kubernetes Service Account, please refer to the Service Account Tokens Documentation on how they work and how to create them.
$ kubectl create serviceaccount my-store
This Service Account needs permissions to read Secret
and create SelfSubjectRulesReview
resources. Please see the above role.
$ kubectl create rolebinding my-store --role=eso-store-role --serviceaccount=default:my-store
Create a SecretStore: the auth
section indicates that the type serviceAccount
will be used for authentication.
apiVersion: external-secrets.io/v1beta1
kind: SecretStore
metadata:
name: k8s-store-sa-auth
spec:
provider:
kubernetes:
# with this, the store is able to pull only from `default` namespace
remoteNamespace: default
server:
# ...
auth:
serviceAccount:
name: "my-store"
Authenticating with Client Certificates
Create a Kubernetes secret which contains the client key and certificate. See Generate Certificates Documentations on how to create them.
$ kubectl create secret tls tls-secret --cert=path/to/tls.cert --key=path/to/tls.key
Reference the tls-secret
in the SecretStore
apiVersion: external-secrets.io/v1beta1
kind: SecretStore
metadata:
name: k8s-store-cert-auth
spec:
provider:
kubernetes:
# with this, the store is able to pull only from `default` namespace
remoteNamespace: default
server:
# ...
auth:
cert:
clientCert:
name: "tls-secret"
key: "tls.crt"
clientKey:
name: "tls-secret"
key: "tls.key"
PushSecret
The PushSecret functionality facilitates the replication of a Kubernetes Secret from one namespace or cluster to another. This feature proves useful in scenarios where you need to share sensitive information, such as credentials or configuration data, across different parts of your infrastructure.
To configure the PushSecret resource, you need to specify the following parameters:
-
Selector: Specify the selector that identifies the source Secret to be replicated. This selector allows you to target the specific Secret you want to share.
-
SecretKey: Set the SecretKey parameter to indicate the key within the source Secret that you want to replicate. This ensures that only the relevant information is shared.
-
RemoteRef.Property: In addition to the above parameters, the Kubernetes provider requires you to set the
remoteRef.property
field. This field specifies the key of the remote Secret resource where the replicated value should be stored.
Here's an example:
apiVersion: external-secrets.io/v1alpha1
kind: PushSecret
metadata:
name: example
spec:
refreshInterval: 1h
secretStoreRefs:
- name: k8s-store-remote-ns
kind: SecretStore
selector:
secret:
name: pokedex-credentials
data:
- match:
secretKey: best-pokemon
remoteRef:
remoteKey: remote-best-pokemon
property: best-pokemon
To utilize the PushSecret feature effectively, the referenced SecretStore
requires specific permissions on the target cluster. In particular it requires create
, read
, update
and delete
permissions on the Secret resource:
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
namespace: remote
name: eso-store-push-role
rules:
- apiGroups: [""]
resources:
- secrets
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
- apiGroups:
- authorization.k8s.io
resources:
- selfsubjectrulesreviews
verbs:
- create
PushSecret Metadata
The Kubernetes provider is able to manage both metadata.labels
and metadata.annotations
of the secret on the target cluster.
Users have different preferences on what metadata should be pushed. ESO by default pushes both labels and annotations to the target secret and merges them with the existing metadata.
You can specify the metadata in the spec.template.metadata
section if you want to decouple it from the existing secret.
apiVersion: external-secrets.io/v1alpha1
kind: PushSecret
metadata:
name: example
spec:
# ...
template:
metadata:
labels:
app.kubernetes.io/part-of: argocd
data:
mysql_connection_string: "mysql://{{ .hostname }}:3306/{{ .database }}"
data:
- match:
secretKey: mysql_connection_string
remoteRef:
remoteKey: backend_secrets
property: mysql_connection_string
Further, you can leverage the .data[].metadata
section to fine-tine the behaviour of the metadata merge strategy. The metadata section is a versioned custom-resource alike structure, the behaviour is detailed below.
apiVersion: external-secrets.io/v1alpha1
kind: PushSecret
metadata:
name: example
spec:
# ...
data:
- match:
secretKey: example-1
remoteRef:
remoteKey: example-remote-secret
property: url
metadata:
apiVersion: kubernetes.external-secrets.io/v1alpha1
kind: PushSecretMetadata
spec:
sourceMergePolicy: Merge # or Replace
targetMergePolicy: Merge # or Replace / Ignore
labels:
color: red
annotations:
yes: please
Field | Type | Description |
---|---|---|
sourceMergePolicy | string: Merge , Replace |
The sourceMergePolicy defines how the metadata of the source secret is merged. Merge will merge the metadata of the source secret with the metadata defined in .data[].metadata . With Replace , the metadata in .data[].metadata replaces the source metadata. |
targetMergePolicy | string: Merge , Replace , Ignore |
The targetMergePolicy defines how ESO merges the metadata produced by the sourceMergePolicy with the target secret. With Merge , the source metadata is merged with the existing metadata from the target secret. Replace will replace the target metadata with the metadata defined in the source. Ignore leaves the target metadata as is. |
labels | map[string]string |
The labels. |
annotations | map[string]string |
The annotations. |
Implementation Considerations
When utilizing the PushSecret feature and configuring the permissions for the SecretStore, consider the following:
-
RBAC Configuration: Ensure that the Role-Based Access Control (RBAC) configuration for the SecretStore grants the appropriate permissions for creating, reading, and updating resources in the target cluster.
-
Least Privilege Principle: Adhere to the principle of least privilege when assigning permissions to the SecretStore. Only provide the minimum required permissions to accomplish the desired synchronization between Secrets.
-
Namespace or Cluster Scope: Depending on your specific requirements, configure the SecretStore to operate at the desired scope, whether it is limited to a specific namespace or encompasses the entire cluster. Consider the security and access control implications of your chosen scope.