Our great sponsors
-
external-secrets
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
Your ask is unclear but I think you're looking for something like https://github.com/external-secrets/external-secrets
-
argocd-vault-plugin
An Argo CD plugin to retrieve secrets from Secret Management tools and inject them into Kubernetes secrets
We’re using https://github.com/argoproj-labs/argocd-vault-plugin which allows you to define secrets in git (works with more backends than just hashicorp vault despite the name). The documentation took me a bit to figure out, but so far it works.
-
SonarQube
Static code analysis for 29 languages.. Your projects are multi-language. So is SonarQube analysis. Find Bugs, Vulnerabilities, Security Hotspots, and Code Smells so you can release quality code every time. Get started analyzing your projects today for free.
-
-
If your secret are not necessarily to be known prior deployment I use this plugin https://github.com/mittwald/kubernetes-secret-generator
-
terratest
Terratest is a Go library that makes it easier to write automated tests for your infrastructure code.
I've ported all my helm charts as terraform modules, because they'd require a ton of customization anyway to replace all the kube-webhook-certgen jobs with the respective cert-manager annotations, I also prefer to sprinkle everything with terratest suites for every tf module.
-
InfluxDB
Build time-series-based applications quickly and at scale.. InfluxDB is the Time Series Platform where developers build real-time applications for analytics, IoT and cloud-native services. Easy to start, it is available in the cloud or on-premises.
Related posts
- Secrets Management with Hashicorp Vault - which integration point to use? Sidecar Injector? ESO?
- Project: Running a local cluster with TLS, ArgoCD GitOps, Vault and a PostgreSQL operator
- Kubernetes authentication from multiple, external clusters
- GitOps and Kubernetes – Secure Handling of Secrets
- Secrets Management on Kubernetes: How do you handle it?