Project Description
Learning about seal secrets and how to use those for home-cluster
Goal for this Hackweek
Switching my home-cluster description (k3s/fluxCI) from a github private repository from public-one by switching to sealed secrets
Looking for hackers with the skills:
This project is part of:
Hack Week 21
Comments
-
over 3 years ago by fcrozat | Reply
I checked both SOPS and sealed-secrets and went for sealed secrets (not relying on another tool, even it is is GPG).
After a lot of fights with flux, I was able to get this working on my home cluster.
I need to recreate my git repository to clear any left credentials before making it available as public.
Following this, I restarted again my old hackweek project https://hackweek.opensuse.org/21/projects/opensuse-leap-slash-tw-slash-microos-slash-kubic-running-on-freebox-delta and found some issues in cloud-init when using openSUSE MicroOS
Similar Projects
Mammuthus - The NFS-Ganesha inside Kubernetes controller by vcheng
Description
As the user-space NFS provider, the NFS-Ganesha is wieldy use with serval projects. e.g. Longhorn/Rook. We want to create the Kubernetes Controller to make configuring NFS-Ganesha easy. This controller will let users configure NFS-Ganesha through different backends like VFS/CephFS.
Goals
- Create NFS-Ganesha Package on OBS: nfs-ganesha5, nfs-ganesha6
- Create NFS-Ganesha Container Image on OBS: Image
- Create a Kubernetes controller for NFS-Ganesha and support the VFS configuration on demand. Mammuthus
Resources