Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

Version 1 Next »

This guide outlines how to create Kubernetes secrets for the various services required in your environment. Replace <namespace> and <REDACTED> with the appropriate namespace and sensitive values.

Database Secrets

MySQL (CMS):

kubectl create secret generic scopear-cms-mysql \
  --namespace=<namespace> \
  --from-literal=password=<REDACTED>

MongoDB (C2):

kubectl create secret generic scopear-c2-mongodb \
  --namespace=<namespace> \
  --from-literal=mongodb_password=<REDACTED>

SMTP Secrets

CMS SMTP:

kubectl create secret generic scopear-cms-smtp \
  --namespace=<namespace> \
  --from-literal=password=<REDACTED>

Object Storage Secrets

MinIO (if using MinIO for object storage):

kubectl create secret generic scopear-minio \
  --namespace=<namespace> \
  --from-literal=MINIO_ROOT_USER=<REDACTED> \
  --from-literal=MINIO_ROOT_PASSWORD=<REDACTED>

AWS S3 Access Keys (if using AWS S3):

For CMS Storage:

kubectl create secret generic scopear-cms-storage \
  --namespace=<namespace> \
  --from-literal=access_key=<REDACTED> \
  --from-literal=secret_key=<REDACTED>

For C2 Storage:

kubectl create secret generic scopear-c2-storage \
  --namespace=<namespace> \
  --from-literal=access_key=<REDACTED> \
  --from-literal=secret_key=<REDACTED>

Redis Secrets

Redis Auth Token (if using AWS Elasticache with authentication tokens):

kubectl create secret generic scopear-cms-redis \
  --namespace=<namespace> \
  --from-literal=token=<REDACTED>

TURN Server (Coturn) Secrets

If using Coturn for Remote Assist:

kubectl create secret generic scopear-turn \
  --namespace=<namespace> \
  --from-literal=username=<REDACTED> \
  --from-literal=password=<REDACTED>

IoT Secrets

If using IoT:

kubectl create secret generic scopear-iot-mongodb \
  --namespace=<namespace> \
  --from-literal=mongodb_password=<REDACTED>

  • No labels