Project Description

Learning about seal secrets and how to use those for home-cluster

Goal for this Hackweek

Switching my home-cluster description (k3s/fluxCI) from a github private repository from public-one by switching to sealed secrets

Looking for hackers with the skills:

kubernetes k8s

This project is part of:

Hack Week 21

Activity

  • about 1 month ago: fcrozat added keyword "kubernetes" to this project.
  • about 1 month ago: fcrozat added keyword "k8s" to this project.
  • about 2 months ago: paulgonin liked this project.
  • 2 months ago: fcrozat started this project.
  • 2 months ago: fcrozat originated this project.

  • Comments

    • fcrozat
      about 1 month ago by fcrozat | Reply

      I checked both SOPS and sealed-secrets and went for sealed secrets (not relying on another tool, even it is is GPG).

      After a lot of fights with flux, I was able to get this working on my home cluster.

      I need to recreate my git repository to clear any left credentials before making it available as public.

      Following this, I restarted again my old hackweek project https://hackweek.opensuse.org/21/projects/opensuse-leap-slash-tw-slash-microos-slash-kubic-running-on-freebox-delta and found some issues in cloud-init when using openSUSE MicroOS

    Similar Projects

    A CLI for Harvester by mohamed.belgaied

    [comment]: # Harvester does not officially come...


    Updatecli Kubernetes Operator by olblak

    [comment]: # (Please use the project descriptio...


    WASM support for cloud native buildpacks by atgracey

    [comment]: # (Please use the project descriptio...


    Uyuni/SUSE Manager Server Helm chart on k3s by moio

    ![Combined icons of k3s and Uyuni](https://user...


    Project Skyscraper - PoC of a Cloud Governance Dashboard by tmuntan1

    Project Description

    We would like to crea...


    Uyuni/SUSE Manager Server Helm chart on k3s by moio

    ![Combined icons of k3s and Uyuni](https://user...