Secret Management

Never Hardcode Secrets in Git Again

External Secrets Implementation

Resources from Video Description

Key Takeaways

  • Use HashiCorp Vault (KV v2) as the central, encrypted source of truth; never store secrets in Git.
  • Install External Secrets Operator (ESO) via Helm to sync Vault → Kubernetes.
  • Configure a ClusterSecretStore (Vault URL, KV path, token Secret) to authenticate and read from Vault.
  • Define ExternalSecret objects to map Vault paths/keys (and optional version) into Kubernetes Secrets.
  • Enable refreshInterval for automatic rotation so K8s Secrets stay aligned with Vault updates.
  • Verify by consuming the generated Secret in a Pod (env or volume) and checking logs.

You now have a secure, auditable, and refreshable secrets workflow—ready for real apps and real environments.