Replies: 1 comment
-
Hey @tuxpeople, your new deployment of the sealed-secrets controller/operator wouldn't be able to decrypt existing SealedSecrets, so you have to get the olds keys into the new cluster (you can automate this). These quotes from the docs will help you:
and
This should mean you can extract the sealing keys from the cluster using the More here: https://github.com/bitnami-labs/sealed-secrets#manual-key-management-advanced |
Beta Was this translation helpful? Give feedback.
-
Hi
My understanding of sealed-secrets is like this:
sealed-secrets
kubeseal
to seal my secretssealed-secrets
automatically rotates the key. The newest key is used bykubeseal
to create new sealed secrets, whilst the old keys are still available to decrypt old sealed secrets.Assuming this is correct, I'm not sure how this works together with GitOps. Maybe I just don't see it :-)
Assuming I'm using Flux for GitOps. I've
sealed-secrets
in my git repo to be deployed by Flux. I also have my encrypted secrets there. Everything is working smoothly like described above. What I don't understand is the following: If I reoinstall my cluster and adding my flux gitrepo again, a new "instance" ofsealed-secrets
get's deployed into my new cluster. This new instance ofsealed-secrets
does not have the old keys of the former instance, right? How would this new instance be able du decrypt the secrets generated earlier with the "old" instance ofsealed-secrets
?Br
Thomas
Beta Was this translation helpful? Give feedback.
All reactions