I have a question in regards to using sealed-secrets .
SealedSecrets solution solves the issue we’ve got: be able to store secrets in our version control. However, we want to be able to re-generate the plain secret file from a sealed-secret file (an already encrypted file by kubeseal). Usecase: you go to an existing repo, clone it and you want to see what are the actual secret values from your local machine.
- Is it possible to accomplish this with kubeseal?
- If not, how do you recommend to achieve such behaviour? Maybe an integration with a cloud secret manager, for instance?
As I understand, it goes against the purpose of sealed secrets, given that I want to decrypt outside of the kubernetes controller. But I hope that the use-case makes sense and I get some recommendations on how to achieve that.
Yes, you can only decrypt by downloading sealed-secrets-key. So you can do same as controller does. You have to have access to namespace where Sealed Secrets is installed.
Just check if
kubectl podsorkubectl nodesshow resources on right cluster and:/tmp/sealed-secret.yamlis your file that is in version control system. You can also find any sealed secret at:kubectl get sealedsecrets -Aand pass it.Reference:
https://github.com/bitnami-labs/sealed-secrets#will-you-still-be-able-to-decrypt-if-you-no-longer-have-access-to-your-cluster