Skip to content

External Secrets Operator📜

Overview📜

External Secrets Operator reads information from a third-party service (such as AWS Secrets Manager, or Vault) and automatically injects the values into the Kubernetes cluster as Kubernetes secrets.

External Secrets Operator📜

graph LR
      vault("Vault")
      awssm("AWS Secrets Manager")
      kubeapi("kube-apiserver") --> esocmp2
      k8secret1("Kubernetes Secret A") <--> extsecret1
      k8secret2("Kubernetes Secret B") <--> extsecret2
      extsecret1("Ext Secret A") <--> secretstore1
      extsecret2("Ext Secret B") <--> secretstore2
      secretstore1("ESO Store A") <--> esocmp1 --> awssm
      secretstore2("ESO Store B") <--> esocmp1 --> vault
      esocmp1("ESO Controller") --> extsecret1
      esocmp1("ESO Controller") --> extsecret2
      esocmp2("ESO Webhook") --> k8secret1
      esocmp2("ESO Webhook") --> k8secret2
      esocmp3("ESO Cert Manager") --> k8secret1
      esocmp3("ESO Cert Manager") --> k8secret2
      app1("Big Bang Package") --> k8secret1
      app1("Big Bang Package") --> k8secret2

Big Bang Touch Points📜

Licensing📜

External Secrets Operator is licensed under the Apache License. No additional licensing is necessary for use or redistribution.

Storage📜

The external secrets operator adds no new storage mechanisms of its own, but allows for the integration of various external secrets providers (like AWS Secrets Manager, or Vault) to Kubernetes secrets.

The only storage to configure is the SecretStore and ClusterSecretStore objects which perform this integration.

UI📜

The external secrets operator has no user interface. It is an operator that enhances and modifies other objects, it is not a service that stands on its own.

Logging📜

The External Secrets Operator produces logs that contain information about the internal state of the controller, webhook and cert controller. This information is currently logged by the default pod logging mechanism.

Note: within Big Bang, logs are captured by fluentbit and shipped to elastic by default.

External Secrets Operator loglevels are controllable through the values passed to the addon. Here is an example of configuring debug log levels for the ESO controller, certificate controller and webhook:

addons:
  vault:
    values:
      extraArgs:
        loglevel: debug
      certController:
        extraArgs:
          loglevel: debug
      webhook:
        extraArgs:
          loglevel: debug

Monitoring📜

The external secrets operator provides the ability to monitor the status and performance of secret stores, external secret providers, and individual secrets. These external secrets are provided through the /metrics endpoint.

Additional steps are required to display the collected metrics in Grafana. A sample dashboard is provided in the upstream documentation.

Health Checks📜

Liveness and readiness probes are included in the external secrets operator chart for all deployments. The /healthz/ready endpoint is used on port 8081 (by default).


Last update: 2024-06-25 by Andrew Kesterson