Installing external secrets with Terraform – Securing and Testing Your CI/CD Pipeline

Installing external secrets with Terraform – Securing and Testing Your CI/CD Pipeline

Let’s configure our local repository to install the external secrets manifest. To do so, copy the application manifest and app.tf file using the following commands:
$ cp ~/modern-devops/ch13/install-external-secrets/app.tf terraform/app.tf $ cp ~/modern-devops/ch13/install-external-secrets/external-secrets.yaml \
manifests/argocd/

Now that we’re all set up and ready, let’s go ahead and commit and push our code using the following commands:
$ git add –all
$ git commit -m “Install external secrets operator”
$ git push

As soon as we push the code, we’ll see that the GitHub Actions workflow has been triggered. To access the workflow, go to https://github.com//mdo-environments/ actions. Soon, the workflow will apply the configuration, create the Kubernetes cluster, and deploy Argo CD, the Sealed Secrets controller, and External Secrets Operator.

Once the workflow is successful, we can do the following to access the Argo Web UI.

We must first authenticate with the GKE cluster. To do so, run the following command:
$ gcloud container clusters get-credentials \ mdo-cluster-dev –zone us-central1-a –project $PROJECT_ID

To utilize the Argo CD Web UI, you will require the external IP address of the argo-server service.

To get that, run the following command:
$ kubectl get svc argocd-server -n argocd

NAME TYPE EXTERNAL-IP PORTS AGE argocd-server LoadBalaner 34.122.51.25 80/TCP,443/TCP 6m15s

So, now we know that Argo CD is accessible on https://34.122.51.25/.

Next, we will run the following commands to reset the admin password:
$ kubectl patch secret argocd-secret -n argocd \
-p ‘{“data”: {“admin.password”: null, “admin.passwordMtime”: null}}’ $ kubectl scale deployment argocd-server –replicas 0 -n argocd $ kubectl scale deployment argocd-server –replicas 1 -n argocd

Now, allow two minutes for the new credentials to be generated. After that, execute the following command to retrieve the password:
$ kubectl -n argocd get secret argocd-initial-admin-secret \ -o jsonpath=”{.data.password}” | base64 -d && echo

As we now have the credentials, log in, and you will see the following page:

Figure 13.7 – Argo CD Web UI – home page

As we can see, there are three applications – sealed-secrets, external-secrets, and blog-app. While the sealed-secrets and external-secrets apps are all synced up and green, blog-app has degraded. That is because, in my case, I’ve started fresh and created a new cluster. Therefore, there is no way the Sealed Secrets operator can decrypt the SealedSecret manifest that we created in the last chapter, as it was generated by a different Sealed Secrets controller.

We don’t need the Sealed Secrets operator; we will use Google Cloud Secret Manager instead. So, let’s remove it from our cluster using the following commands:
$ rm -rf manifests/sealed-secrets
$ git add –all
$ git commit -m “Removed sealed secrets”
$ git push

We’ve removed the Sealed Secrets operator, and the Argo CD Web UI should reflect that shortly.
However, the Blog Application will remain degraded as the mongodb-creds Secret is still missing.
In the next section, we will use External Secrets Operator to generate the mongodb-creds Secret.

Leave a Reply

Your email address will not be published. Required fields are marked *



          Terms of Use | About Breannaworld | Privacy Policy | Cookies | Accessibility Help | Contact Breannaworld