You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello,
We are using S3 as persistence storage for DocumentServer. For extraconf parameters this guide leads us to use ConfigMap. Is there another way to handle those secrets to not store them in ConfigMap as plaintext? Its not very secure when you are using IaC and need to store "local.json" with extraconf params in Git as well.
To solve this issue you can keep either the entire encrypted local.json file on git or just the required keys values. For encryption/decryption in a cluster you can use either [Sealed Secrets] https://github.com/bitnami-labs/sealed-secrets or a more-recommended [Mozilla SOPS] https://github.com/getsops/sops
Hello,
We are using S3 as persistence storage for DocumentServer. For extraconf parameters this guide leads us to use ConfigMap. Is there another way to handle those secrets to not store them in ConfigMap as plaintext? Its not very secure when you are using IaC and need to store "local.json" with extraconf params in Git as well.
Thank you in advance
The text was updated successfully, but these errors were encountered: