Project Description

Learning about seal secrets and how to use those for home-cluster

Goal for this Hackweek

Switching my home-cluster description (k3s/fluxCI) from a github private repository from public-one by switching to sealed secrets

Looking for hackers with the skills:

kubernetes k8s

This project is part of:

Hack Week 21

Activity

  • almost 2 years ago: fcrozat added keyword "kubernetes" to this project.
  • almost 2 years ago: fcrozat added keyword "k8s" to this project.
  • almost 2 years ago: paulgonin liked this project.
  • almost 2 years ago: fcrozat started this project.
  • almost 2 years ago: fcrozat originated this project.

  • Comments

    • fcrozat
      almost 2 years ago by fcrozat | Reply

      I checked both SOPS and sealed-secrets and went for sealed secrets (not relying on another tool, even it is is GPG).

      After a lot of fights with flux, I was able to get this working on my home cluster.

      I need to recreate my git repository to clear any left credentials before making it available as public.

      Following this, I restarted again my old hackweek project https://hackweek.opensuse.org/21/projects/opensuse-leap-slash-tw-slash-microos-slash-kubic-running-on-freebox-delta and found some issues in cloud-init when using openSUSE MicroOS

    Similar Projects

    RKE2/K3S working on IBM Power by tkelly

    [comment]: # (Please use the project descriptio...


    mikrolite - a cli to create lighweight Kubernetes clusters using microvms by rcase

    [comment]: # (Please use the project descriptio...


    Predefined app security policy template for NeuVector by feih

    Project Description

    Idea is to predefin...


    A CLI for Harvester by mohamed.belgaied

    [comment]: # Harvester does not officially come...