Examples with how to not use secrets, used for the talk "Our secrets management journey from Code to Vault" and "Securing Your Secrets in the Cloud".
For the basic docker exercises you currently require:
- Docker
You can install it by doing:
docker run -p 8080:8080 jeroenwillemsen/addo-example:36Now you can try to find the secrets by means of solving the challenge offered at:
- localhost:8080/challenge/1
- localhost:8080/challenge/2
- localhost:8080/challenge/3
- localhost:8080/challenge/4
- localhost:8080/challenge/5
- localhost:8080/challenge/6
- localhost:8080/challenge/7
- localhost:8080/challenge/8
The K8S setup currently is based on using Minikube for local fun:
minikube start
kubectl apply -f k8s/secrets-config.yml
kubectl apply -f k8s/secrets-secret.yml
kubectl apply -f k8s/secret-challenge-deployment.yml
while [[ $(kubectl get pods -l app=secret-challenge -o 'jsonpath={..status.conditions[?(@.type=="Ready")].status}') != "True" ]]; do echo "waiting for secret-challenge" && sleep 2; done
kubectl expose deployment secret-challenge --type=LoadBalancer --port=8080
minikube service secret-challengenow you can use the provided ip-address and port to further play with the K8s variant (instead of localhost).
Want to run vanilla on your own k8s? Use the commands below:
kubectl apply -f k8s/secrets-config.yml
kubectl apply -f k8s/secrets-secret.yml
kubectl apply -f k8s/secret-challenge-deployment.yml
while [[ $(kubectl get pods -l app=secret-challenge -o 'jsonpath={..status.conditions[?(@.type=="Ready")].status}') != "True" ]]; do echo "waiting for secret-challenge" && sleep 2; done
kubectl port-forward \
$(kubectl get pod -l app=secret-challenge -o jsonpath="{.items[0].metadata.name}") \
8080:8080
Make sure you have the following installed:
- minikube with docker (or comment out line 8 and work at your own k8s setup),
- helm,
- kubectl,
- jq,
- vault,
- grep,
- cat,
- sed
Run ./k8s-vault-minkube-start.sh, the challenge will wait for you at http://localhost:8080
With thanks to @madhuakula for motivating me to setup the project, and thanks to @bendehaan & @nbaars for accelerating the project.