Skip to main content

Configure Agent Secrets for KinD Cluster

🚧 This page is still under construction 🚧

Configuring platform secrets is a critical step in ensuring the security and integrity of your applications and integrations. Secrets such as API keys, credentials, and tokens must be stored securely to prevent unauthorized access and potential breaches. This guide provides examples and best practices for managing secrets across various tools and platforms using Kubernetes secrets. Follow the instructions below to configure secrets for your environment.

ArgoCD​

To configure secrets for ArgoCD, ensure you have access to the Kubernetes cluster where ArgoCD is installed. Use Kubernetes secrets to store sensitive information such as repository credentials or webhook tokens. Example:

kubectl create secret generic argocd-repo-creds \
--from-literal=username=<your-username> \
--from-literal=password=<your-password> \
-n argocd

Update the ArgoCD configuration to reference the created secret.


PagerDuty​

For PagerDuty integration, create a secret to store the API key. Example:

kubectl create secret generic pagerduty-api-key \
--from-literal=apiKey=<your-api-key> \
-n monitoring

Ensure your monitoring tool (e.g., Prometheus or Alertmanager) is configured to use this secret.


Atlassian Jira and Confluence​

Create secrets for Jira and Confluence API tokens or credentials. Example:

kubectl create secret generic jira-confluence-creds \
--from-literal=username=<your-username> \
--from-literal=apiToken=<your-api-token> \
-n atlassian

Update your integration scripts or tools to reference these secrets.


Backstage Installation​

For Backstage, store sensitive information such as database credentials or API keys in Kubernetes secrets. Example:

kubectl create secret generic backstage-db-creds \
--from-literal=username=<db-username> \
--from-literal=password=<db-password> \
-n backstage

Ensure Backstage configuration files reference these secrets.


Webex​

Store Webex integration tokens securely using Kubernetes secrets. Example:

kubectl create secret generic webex-token \
--from-literal=token=<your-webex-token> \
-n communication

Update your Webex integration scripts to use this secret.


Slack​

For Slack, store the bot token or webhook URL in a Kubernetes secret. Example:

kubectl create secret generic slack-token \
--from-literal=token=<your-slack-bot-token> \
-n communication

Ensure your Slack integration tools reference this secret.


GitHub​

Store GitHub personal access tokens or SSH keys securely. Example:

kubectl create secret generic github-creds \
--from-literal=token=<your-personal-access-token> \
--from-file=sshKey=<path-to-ssh-key> \
-n github

Update your CI/CD pipelines or tools to use these secrets.