This guide outlines how to create Kubernetes secrets for the various services required in your environment. Replace <namespace> and <REDACTED> with the appropriate namespace and sensitive values.
Database Secrets
MySQL (CMS):
Code Block |
---|
kubectl create secret generic scopear-cms-mysql \
--namespace=<namespace> \
--from-literal=password=<REDACTED> |
MongoDB (C2):
Code Block |
---|
kubectl create secret generic scopear-c2-mongodb \
--namespace=<namespace> \
--from-literal=mongodb_password=<REDACTED> |
SMTP Secrets
CMS SMTP:
Code Block |
---|
kubectl create secret generic scopear-cms-smtp \
--namespace=<namespace> \
--from-literal=password=<REDACTED> |
Object Storage Secrets
MinIO (if using MinIO for object storage):
Code Block |
---|
kubectl create secret generic scopear-minio \
--namespace=<namespace> \
--from-literal=MINIO_ROOT_USER=<REDACTED> \
--from-literal=MINIO_ROOT_PASSWORD=<REDACTED> |
AWS S3 Access Keys (if using AWS S3 w/o IAM Authentication):
For CMS Storage:
Code Block |
---|
kubectl create secret generic scopear-cms-storage \
--namespace=<namespace> \
--from-literal=access_key=<REDACTED> \
--from-literal=secret_key=<REDACTED> |
For C2 Storage:
Code Block |
---|
kubectl create secret generic scopear-c2-storage \
--namespace=<namespace> \
--from-literal=access_key=<REDACTED> \
--from-literal=secret_key=<REDACTED> |
Redis Secrets
Redis Auth Token (if using AWS Elasticache with authentication tokens):
Code Block |
---|
kubectl create secret generic scopear-cms-redis \
--namespace=<namespace> \
--from-literal=token=<REDACTED> |
TURN Server (Coturn) Secrets
If using Coturn for Remote Assist:
Code Block |
---|
kubectl create secret generic scopear-turn \
--namespace=<namespace> \
--from-literal=username=<REDACTED> \
--from-literal=password=<REDACTED> |
IoT Secrets
If using IoT:
Code Block |
---|
kubectl create secret generic scopear-iot-mongodb \
--namespace=<namespace> \
--from-literal=mongodb_password=<REDACTED> |
...