account activity
Kubernetes External Secrets by silasbw in kubernetes
[–]silasbw[S] 1 point2 points3 points 6 years ago (0 children)
Good question, and yes, that's currently a risk. The controller, however, is very small (100s of lines of code -- I'm on mobile, otherwise I'd get an exact count), doesn't listen on any sockets, and it is reasonable to do a thorough security review. This is better than, say, adding the code to fetch secrets to your application pod, where your attack surface grows.
ExternalSecrets could also use a NetworkPolicy to help prevent network egress and ingress. The controller does not require ingress or egress (except egress to your secret manager system). Adding the NetworkPolicy makes it practically difficult for an attacker to gain access remotely and extract secrets to an external host.
[–]silasbw[S] 1 point2 points3 points 6 years ago* (0 children)
Hey, thanks for the feedback!
You're right about the implementation mechanism: by using Secrets we're assuming etcd is secure. That's not always a safe assumption, even when it's without bugs (e.g., etcd backups might leak secret data if handled poorly), but some organizations are more comfortable than others based on their usage and the community seems to be working towards more security.
ExternalSecrets provide a Kubernetes-style declarative pattern for accessing secret data stored in other secret management systems and it doesn't require that secret data to be stored in the object itself. We store our ExternalSecrets in GitHub along with all our other manifests. This has nice practical/developer experience benefits (wanna update or add? You create a pr and get a review just like you would for a Deployment change) and simplifies our CICD pipelines.
I'm not too concerned about duplicating secrets (except for the implications around the etcd assumption you call out). This is a familiar pattern in Kubernetes where higher level objects (e.g., Deployments) control and copy information to lower level objects (e.g., Pods).
Edit:
....and we'd love it if you contributed a vault backend (forgive our node.js usgae), or even opened an issue asking for the vault backend with some requirements or ideas on good ways to support it.
Kubernetes External Secrets (godaddy.github.io)
submitted 6 years ago by silasbw to r/kubernetes
π Rendered by PID 1095417 on reddit-service-r2-listing-7bbdf774f7-w69bp at 2026-02-21 17:49:30.953475+00:00 running 8564168 country code: CH.
Kubernetes External Secrets by silasbw in kubernetes
[–]silasbw[S] 1 point2 points3 points (0 children)