-
Couldn't load subscription status.
- Fork 136
Open
Description
Some secrets used for different applications have been created manually in the cluster.
Using SealedSecrets seems like the best approach to manage them as code.
Another alternative would be External Secrets, but it would require a provider such as GCP Secret Manager at additional costs and secrets at this location would still need to be managed manually.
The list of the secrets that were applied manually are:
- dex/dex
- argocd/argocd-auth
- prometheus-operator/prometheus-operator-grafana
- Only the key
admin-password
- Only the key
- argo/argo-server-sso
- argo/argo-workflows-webhook-clients
AC
- Update the different README.md to reflect the changes
- Manage secrets as code
agilgur5
Metadata
Metadata
Assignees
Labels
No labels