Replies: 1 comment
-
|
Hey @tuxpeople, your new deployment of the sealed-secrets controller/operator wouldn't be able to decrypt existing SealedSecrets, so you have to get the olds keys into the new cluster (you can automate this). These quotes from the docs will help you:
and
This should mean you can extract the sealing keys from the cluster using the More here: https://github.com/bitnami-labs/sealed-secrets#manual-key-management-advanced |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi
My understanding of sealed-secrets is like this:
sealed-secretskubesealto seal my secretssealed-secretsautomatically rotates the key. The newest key is used bykubesealto create new sealed secrets, whilst the old keys are still available to decrypt old sealed secrets.Assuming this is correct, I'm not sure how this works together with GitOps. Maybe I just don't see it :-)
Assuming I'm using Flux for GitOps. I've
sealed-secretsin my git repo to be deployed by Flux. I also have my encrypted secrets there. Everything is working smoothly like described above. What I don't understand is the following: If I reoinstall my cluster and adding my flux gitrepo again, a new "instance" ofsealed-secretsget's deployed into my new cluster. This new instance ofsealed-secretsdoes not have the old keys of the former instance, right? How would this new instance be able du decrypt the secrets generated earlier with the "old" instance ofsealed-secrets?Br
Thomas
Beta Was this translation helpful? Give feedback.
All reactions