-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to configure a "master token secret" #55
Comments
@jhoelzel The recommended way to accomplish this would be to use Service Accounts. You can give the SA access to whichever configs you're managing in Kubernetes and then a Service Account Token for it will have access to all those configs. You would then use that one token in all your
That said, Service Accounts are only available on the Team plan or higher. Is that a potential option for you? |
Thank you for your answer but that only gives acces to all projects at the same time right? There is no way to create for instance a "staging" and a "production" token where i want to keep the secrets apart fort security reasons, if i am not mistaken? thanks in advance |
@jhoelzel Correct. There's no way to provide access to a specific subset of environments on all projects automatically. You can still accomplish that, but you'd need to do it per-project manually. You can automate that via our API though. You can manage it via Terraform as well by using project_member_group and project_member_service_account. |
ok thank you for this information, i understand and will work around this. For the future "secretKeyRef" would still be a nice feature for the tokensecret. In clusters where compliance is needed, i really have to separate production from everything else and that will be the easy way to do it =) |
So i have just finished my prototype for this and summing up it would be much easier to implement "secretKeyRef" on your side than for us to have to maintain what bascially is an operator by itself =) So for christmas, we hope that our feature-request can make it on the list for sometime next year! Cheers and thank you for creating doppler |
Hi, we encountered a similar use case that we needed. Basically, we created a doppler project name doppler-tokens, where we would store service tokens for individual projects. We then used external secrets operator to convert each individual key from doppler-tokens into a separate kubernetes secret with a name matching the project name. We then create the doppler secret CRD pointing to the respective secret. The only thing we need to do, is when we need to add a new doppler project to be used in the cluster, we need to create a service token for it and store it inside of the doppler-tokens project. This we automated using a simple script using doppler CLI. Ideally we'd like for this functionality to be available out of the box in the doppler kubernetes operator |
Hey guys,
First of all thank you for the operator, we use it constantly.
Now there has come a point where we are spending more time deploying "token secrets" into the cluster than anything esle, which is especially true if you do feature deployments with kubernetes.
Is there a simple way to deploy a "token secret" with multiple DOPPLER tokens inside and use that to create other secrets?
Usercase:
basically im looking for this:
But maybe there is a better way which i simply cant see?
thanks
The text was updated successfully, but these errors were encountered: