Hello everyone,
I have a microservices environment setup with OIDC values being read from GitHub.
I think it’d be more secure if my GitHub repo was private, but since my secret is encrypted, I’m not too concerned.
I created this encrypted value by adding a .env file in my docker-compose directory with the following value:
ENCRYPT_KEY=asdfasdfa
Then, I modified my docker-compose.yml file for the JHipster Registry to read this value.
environment:
...
- SPRING_CLOUD_CONFIG_SERVER_COMPOSITE_0_TYPE=git
- SPRING_CLOUD_CONFIG_SERVER_COMPOSITE_0_URI=
https://github.com/mraible/reactive-java-ms-config/ - SPRING_CLOUD_CONFIG_SERVER_COMPOSITE_0_SEARCH_PATHS=config
- SPRING_CLOUD_CONFIG_SERVER_COMPOSITE_0_LABEL=main
- ENCRYPT_KEY=${ENCRYPT_KEY}
Now, I want to deploy everything with k8s. What’s the best way to set my ENCRYPT_KEY? I don’t want to do it in YAML files because I’ll likely check those in.
I watched this talk from FOSDEM 2021 that seems to recommend sealed secrets.
I want to figure out the easiest, yet secure, way to store secrets for JHipster when running in k8s. Any advice is appreciated!
Thanks,
Matt