Please note, this project is no longer being maintained.There is an active fork jkroepke/helm-secrets and we will also contribute our future changes to it.
Developed and used in all environments in BaseCRM.
We store secrets and values in helm_vars
dir structure just like in this repository example dir. All this data versioned in GIT.Working in teams on multiple projects/regions/envs and multiple secrets files at once.We have Makefile in our Helm charts repo to simplify install helm-secrets plugin with helm and other stuff we use. Same Makefile used to rebuild all helm charts with dependencies and some other everyday helpers.Encrypting, Decrypting, Editing secrets on local clones, making #PR's and storing this in our helm charts repo encrypted with PGP, AWS KMS and GCP KMS.Deploying using helm-wrapper from local or from CI with same charts and secrets/values from GIT repository.
A first internal version of the plugin used pure PGP and the whole secret file was encrypted as one.A current version of the plugin using Golang sops as backend which could be integrated in future into Helm itself, but currently, it is only shell wrapper.
What kind of problems this plugin solves:
helm-wrapper
- It is not a part of Helm project itself. It is a just simple wrapper in the shell that runs helm within but wrapping secret decryption and cleaning on-the-fly, before and after Helm run. It is created from install-binary.sh in helm-secrets plugin install process as hook action making the symlink to wrapper.sh. This should be used as default command to operate with Helm client with helm-secrets installed.
test.sh
- Test script to check if all parts of the plugin work. Using example dir with vars structure and PGP keys to make real tests on real data with real encryption/decryption.
install-binary.sh
- Script used as the hook to download and install sops and install git diff configuration for helm-secrets files.
secrets.sh
- Main helm-secrets plugin code for all helm-secrets plugin actions available in helm secrets help
after plugin install
Just install the plugin using helm plugin install https://github.com/zendesk/helm-secrets
and sops will be installed as part of it, using hook when helm > 2.3.x
You can always install manually in MacOS as below:
brew install sops
For Linux RPM or DEB, sops is available here: Dist Packages
Git config part is installed with the plugin, but to be fully functional the following needs to be added to the .gitattributes
file in the root directory of a charts repo:
secrets.yaml diff=sopsdiffer
secrets.*.yaml diff=sopsdiffer
More info on sops page
As already described above,
helm plugin install https://github.com/zendesk/helm-secrets
Get a release tarball from the releases page.
Unpack the tarball in your helm plugins directory ($(helm home)/plugins
).
For example:
curl -L $TARBALL_URL | tar -C $(helm home)/plugins -xzv
By default, helm-wrapper is not configured to encrypt/decrypt secrets.yaml in charts templates. They are treated as templates and values from specific secrets/value files should be used in these templates as a reference from helm itself.Set you own options as ENV variables if you like to overwrite default kms enabled and decrypt charts disabled.
DECRYPT_CHARTS=false helm-wrapper...
$ helm secrets help
GnuPG secrets encryption in Helm Charts
This plugin provides ability to encrypt/decrypt secrets files
to store in less secure places, before they are installed using
Helm.
To decrypt/encrypt/edit you need to initialize/first encrypt secrets with
sops - https://github.com/mozilla/sops
Available Commands:
enc Encrypt secrets file
dec Decrypt secrets file
view Print secrets decrypted
edit Edit secrets file and encrypt afterwards
clean Remove all decrypted files in specified directory (recursively)
install wrapper that decrypts secrets[.*].yaml files before running helm install
template wrapper that decrypts secrets[.*].yaml files before running helm template
upgrade wrapper that decrypts secrets[.*].yaml files before running helm upgrade
lint wrapper that decrypts secrets[.*].yaml files before running helm lint
diff wrapper that decrypts secrets[.*].yaml files before running helm diff
(diff is a helm plugin)
By convention, files containing secrets are named secrets.yaml
, or anything beginning with "secrets." and ending with ".yaml". E.g. secrets.test.yaml
and secrets.prod.yaml
.
Decrypted files have the suffix ".yaml.dec" by default. This can be changed using the HELM_SECRETS_DEC_SUFFIX
environment variable.
enc Encrypt secrets file
dec Decrypt secrets file
view Print decrypted secrets file
edit Edit secrets file (decrypt before and encrypt after)
clean Delete *.yaml-dec files in directory (recursively)
Each of these commands have their own help.
Note: You need to run gpg --import example/pgp/project{x,y}.asc
in order to successfully decrypt secrets included in the examples
The decrypt operation decrypts a secrets.yaml file and saves the decrypted result in secrets.yaml.dec:
$ helm secrets dec example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
Decrypting example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
The secrets.yaml.dec file:
secret_sandbox_projectx: secret_foo_123
Note that if the secrets.yaml.dec file already exists and is newer than secrets.yaml, it will not be overwritten:
$ helm secrets dec example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
Decrypting example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml.dec is newer than example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
The encrypt operation encrypts a secrets.yaml.dec file and saves the encrypted result in secrets.yaml:
If you initially have an unencrypted secrets.yaml file, it will be used as input and will be overwritten:
$ helm secrets enc example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
Encrypting example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
Encrypted example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
If you already have an encrypted secrets.yaml file and a decrypted secrets.yaml.dec file, encrypting will encrypt secrets.yaml.dec to secrets.yaml:
$ helm secrets dec example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
Decrypting example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
$ helm secrets enc example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
Encrypting example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
Encrypted example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml.dec to example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
The view operation decrypts secrets.yaml and prints it to stdout:
$ helm secrets view example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
secret_sandbox_projectx: secret_foo_123
The edit operation will decrypt the secrets.yaml file and open it in an editor. If the file is modified, it will be encrypted again after you exit the editor.
$ helm secrets edit example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml
There is new feature in SOPS master that allows using $EDITOR to specify editor used by sops but not released yet.
The operation will delete all decrypted files in a directory, recursively:
$ helm secrets clean example/helm_vars/projectX/sandbox/us-east-1/java-app/
removed example/helm_vars/projectX/sandbox/us-east-1/java-app/secrets.yaml.dec
If you use git there is commit hook that prevents commiting decrypted files and you can add all *.yaml.dec files in you repository .gitignore
file.
.sops.yaml
rules to make everything automatic-f
option from you helm_vars values dir tree.We use vars for Helm Charts from separate directory tree with the structure like this:
helm_vars/
├── .sops.yaml
├── projectX
| ├── .sops.yaml
│ ├── production
│ │ └── us-east-1
│ │ └── java-app
│ │ └── hello-world
│ │ ├── secrets.yaml
│ │ └── values.yaml
│ ├── sandbox
│ │ └── us-east-1
│ │ └── java-app
│ │ └── hello-world
│ │ ├── secrets.yaml
│ │ └── values.yaml
| ├── secrets.yaml
│ └── values.yaml
├── projectY
| ├── .sops.yaml
│ ├── production
│ │ └── us-east-1
│ │ └── java-app
│ │ └── hello-world
│ │ ├── secrets.yaml
│ │ └── values.yaml
│ ├── sandbox
│ │ └── us-east-1
│ │ └── java-app
│ │ └── hello-world
│ │ ├── secrets.yaml
│ │ └── values.yaml
| ├── secrets.yaml
│ └── values.yaml
├── secrets.yaml
└── values.yaml
As you can see we can run different PGP or KMS keys per project, globally or per any tree level. Thanks to this we can isolate tree on different CI/CD instances using same GIT repository.As we use simple -f option when running the helm wrapper we can just use encrypted secrets.yaml and all these secrets will be decrypted and cleaned on the fly before and after helm run.
.sops.yaml
file example
---
creation_rules:
# Encrypt with AWS KMS
- kms: 'arn:aws:kms:us-east-1:222222222222:key/111b1c11-1c11-1fd1-aa11-a1c1a1sa1dsl1+arn:aws:iam::222222222222:role/helm_secrets'
# Encrypt using GCP KMS
- gcp_kms: projects/mygcproject/locations/global/keyRings/mykeyring/cryptoKeys/thekey
# As failover encrypt with PGP
- pgp: '000111122223333444AAAADDDDFFFFGGGG000999'
# For more help look at https://github.com/mozilla/sops
Multiple KMS and PGP are allowed.
Everything is described in SOPS docs - links in this project description.
Running helm to install/upgrade chart with our secrets files is simple with the included helm wrapper which will decrypt on-the-fly and use decrypted secrets files in the actual helm command.
install run "helm install" with decrypted secrets files
upgrade run "helm upgrade" with decrypted secrets files
lint run "helm lint" with decrypted secrets files
diff run "helm diff" with decrypted secrets files
The wrapper enables you to call these helm commands with on-the-fly decryption of secrets files passed as -f
or --values
arguments. Instead of calling e.g. helm install ...
you can call helm secrets install ...
to get on-the-fly decryption.
The diff command is a separate helm plugin, helm-diff. Using it you can view the changes that would be deployed before deploying. In the same way as above, instead of calling e.g. helm diff upgrade ...
you can call helm secrets diff upgrade ...
, and so on.
Note that if a decrypted secrets.yaml.dec file exists and is newer then the secrets.yaml file, it will be used in the wrapped command rather than decrypting secrets.yaml.
Real example of the helm wrapper usage with simple java helloworld application.
AWS_PROFILE=sandbox helm secrets upgrade \
helloworld \
stable/java-app \
--install \
--timeout 600 \
--wait \
--kube-context=sandbox \
--namespace=projectx \
--set global.app_version=bff8fc4 \
-f helm_vars/projectx/sandbox/us-east-1/java-app/helloworld/secrets.yaml \
-f helm_vars/projectx/sandbox/us-east-1/java-app/helloworld/values.yaml \
-f helm_vars/secrets.yaml \
-f helm_vars/values.yaml
Release "helloworld" has been upgraded. Happy Helming!
LAST DEPLOYED: Fri May 5 13:27:01 2017
NAMESPACE: projectx
STATUS: DEPLOYED
RESOURCES:
==> extensions/v1beta1/Deployment
NAME DESIRED CURRENT UP-TO-DATE AVAILABLE AGE
helloworld 3 3 3 2 1h
==> v1/Secret
NAME TYPE DATA AGE
helloworld Opaque 10 1h
==> v1/ConfigMap
NAME DATA AGE
helloworld 2 1h
==> v1/Service
NAME CLUSTER-IP EXTERNAL-IP PORT(S) AGE
helloworld 100.65.221.245 <none> 8080/TCP 1h
NOTES:
Deploy success helloworld-bff8fc4 in namespace projectx
removed helm_vars/projectx/sandbox/us-east-1/java-app/helloworld/secrets.yaml.dec
removed helm_vars/secrets.yaml.dec
You can see that we use a global secrets file and a specific secrets file for this app in this project/environment/region. We use some plain value files next to secrets. We use values from secrets in some secrets template in helloworld application chart template and some values are used in the configmap template in the same chart. Some values are added as env variables in deployment manifest templates in the chart. As you can see we can use secrets and values in helm in many ways. Everything depends on use case.
Even when helm failed then decrypted files are cleaned
AWS_PROFILE=sandbox helm-wrapper upgrade \
helloworld \
stable/java-app \
--install \
--timeout 600 \
--wait \
--kube-context=wrongcontext \
--namespace=projectx \
--set global.app_version=bff8fc4 \
-f helm_vars/projectx/sandbox/us-east-1/java-app/helloworld/secrets.yaml \
-f helm_vars/projectx/sandbox/us-east-1/java-app/helloworld/values.yaml \
-f helm_vars/secrets.yaml \
-f helm_vars/values.yaml
Error: could not get kubernetes config for context 'wrongcontext': context "wrongcontext" does not exist
removed helm_vars/projectx/sandbox/us-east-1/java-app/helloworld/secrets.yaml.dec
removed helm_vars/secrets.yaml.dec
We just need to create Kubernetes secrets template in chart templates dir.For example in your charts repo you have stable/helloworld/
. Inside this chart you should have stable/helloworld/templates/
dir and then create the stable/helloworld/templates/secrets.yaml
file with content as specified bellow.
apiVersion: v1
kind: Secret
metadata:
name: helloworld
labels:
app: helloworld
chart: "{{ .Chart.Name }}-{{ .Chart.Version }}"
release: "{{ .Release.Name }}"
heritage: "{{ .Release.Service }}"
type: Opaque
data:
my_secret_key: {{ .Values.secret_sandbox_helloworld | b64enc | quote }}
In this example you have a Kubernetes secret named "helloworld" and data inside this secret will be filled in from values defined in -f helm_vars/projectx/sandbox/us-east-1/java-app/helloworld/secrets.yaml
. We use .Values.secret_sandbox_helloworld
to refer to the value in the decrypted secret file. In this way, the value from the decrypted helm_vars/projectx/sandbox/us-east-1/java-app/helloworld/secrets.yaml
will be available as my_secret_key
in Kubernetes.
You can now use the "helloworld" secret in your deployment manifest (or any other manifest supporting secretKeyRef) in the env section like this:
apiVersion: extensions/v1beta1
kind: Deployment
...
...
containers:
...
...
env:
- name: my_new_secret_key
valueFrom:
secretKeyRef:
name: helloworld
key: my_secret_key
If you like to secure situation when decrypted file is committed by mistake to git you can add your secrets.yaml.dec files to you charts project repository .gitignore
.
A second level of security is to add for example a .sopscommithook
file inside your chart repository local commit hook.
This will prevent committing decrypted files without sops metadata.
.sopscommithook
content example:
#!/bin/sh
for FILE in $(git diff-index HEAD --name-only | grep <your vars dir> | grep "secrets.y"); do
if [ -f "$FILE" ] && ! grep -C10000 "sops:" $FILE | grep -q "version:"; then
echo "!!!!! $FILE" 'File is not encrypted !!!!!'
echo "Run: helm secrets enc <file path>"
exit 1
fi
done
exit
Copyright 2017 Zendesk
Licensed under the Apache License, Version 2.0
1.安装插件 brew install sops helm plugin install https://github.com/jkroepke/helm-secrets 2.项目根目录下创建.sop.yaml creation_rules: - kms: "arn:aws:kms:us-west-*******:key/2******-85ba-********" 3.创建secret.y
安装Helm Helm有两个部分:Helm客户端(helm)和Helm服务器(Tiller)。 本指南介绍如何安装客户端,然后继续介绍安装服务器的两种方式。 重要提示:如果您有责任确保您的群集是受控制的环境,尤其是在共享资源时,强烈建议使用安全配置安装Tiller。 有关指导,请参阅安装Helm安装。 安装helm客户端 Helm客户端可以从源代码安装,也可以从预先构建的二进制版本安装。 用二进制
部署k3s和Helm-Rancher 提供者:MappleZF 版本:1.0.0 一、部署k3s server节点 1.1 下载安装包 //https://github.com/rancher/k3s/releases 1.2 部署程序 [root@k3s:/root]# cp k3s /usr/local/bin/ && chmod +x /usr/local/bin/k3s [root@
安装helm v3版本 #当前helm版本 [root@master helm]# helm version Client: &version.Version{SemVer:"v2.16.12", GitCommit:"47f0b88409e71fd9ca272abc7cd762a56a1c613e", GitTreeState:"clean"} Server: &version.Version{
“Sealed Secrets” 的目的(保留英文原滋原味) Problem: “I can manage all my K8s config in git, except Secrets.” Solution: Encrypt your Secret into a SealedSecret, which is safe to store - even inside a public reposi
参考文档 https://grafana.com/docs/grafana/latest/installation/kubernetes/ https://github.com/grafana/helm-charts https://github.com/grafana/helm-charts/blob/grafana-6.24.1/charts/grafana/README.md 获取 rep
提供的一些声明和使用命名模板段的操作: define在模板中声明一个新的命名模板 template导入一个命名模板 block 声明了一种特殊的可填写模板区域 首先,模板名称是全局的。如果声明两个具有相同名称的模板,则最后加载一个模板是起作用的模板。由于子chart中的模板与顶级模板一起编译,因此注意小心地使用特定chart的名称来命名模板。 通用的命名方式是,以chart名称作为前缀,eg: {
概述 Helm是K8S的包管理工具,类似于Linux系统的apt、yum等。 基本概念 Helm:一个命令行下的客户端工具。主要用于K8S应用程序chart的创建、打包、发布,也可以创建和管理本地和远程的chart仓库。 Chart:一个Helm包,采用tar格式,包含运行一个应用程序所需的镜像、依赖和资源定义等。 release:在K8S集群上运行的Chart的一个实例。 Repository:
11.5 chart详解 chart由一系列文件组成,这些文件描述了K8s部署应用时需要的资源,比如Servcie、Deployment、PersistentVolmeClaim、Secret、ConfigMap等。 chart可以很复杂,部署整个应用,比如包含HTTP servers、Database、消息中间件、Cache等。 chart将这些文件放置在预定义的目录结构中,通常被打
基本概念 Helm 的三个基本概念 Chart:Helm 应用(package),包括该应用的所有 Kubernetes manifest 模版,类似于 YUM RPM 或 Apt dpkg 文件 Repository:Helm package 存储仓库 Release:chart 的部署实例,每个 chart 可以部署一个或多个 release Helm 工作原理 Helm 包括两个部分,hel
查询 charts helm search helm search mysql 查询 package 详细信息 helm inspect stable/mariadb 部署 package helm install stable/mysql 部署之前可以自定义 package 的选项: # 查询支持的选项 helm inspect values stable/mysql # 自定义 passwor
Helm 帮助您管理 Kubernetes 应用程序——Helm Charts 帮助您定义、安装和升级最复杂的 Kubernetes 应用程序。 Helm 可以使用 Charts 启动 Kubernetes 集群,提供可用的工作流: 一个 Redis 集群 一个 Postgres 数据库 一个 HAProxy 边界负载均衡 特性: 查找并使用流行的软件,将其打包为 Helm Charts,以便在
Helm 是一个在桌面上使用的系统监控小工具,可定制监控的内容并在桌面上显示,如下图所示:
python-helm 是 kubernetes 组件 helm 的 python 客户端,它是基于 pyhelm 进行功能扩展, 对tiller 的操作更为全面。 功能 python-helm 可以实现对Tiller的访问 Tiller控制 安装 升级 回滚 删除 测试 获取版本历史
Prometheus Community Kubernetes Helm Charts This functionality is in beta and is subject to change. The code is provided as-is with no warranties. Beta features are not subject to the support SLA of o