This guide outlines how to create Kubernetes secrets for the various services required in your environment. Replace <namespace> and <REDACTED> with the appropriate namespace and sensitive values.
Database Secrets
MySQL (CMS):
kubectl create secret generic scopear-cms-mysql \ --namespace=<namespace> \ --from-literal=password=<REDACTED>
MongoDB (C2):
kubectl create secret generic scopear-c2-mongodb \ --namespace=<namespace> \ --from-literal=mongodb_password=<REDACTED>
SMTP Secrets
CMS SMTP:
kubectl create secret generic scopear-cms-smtp \ --namespace=<namespace> \ --from-literal=password=<REDACTED>
Object Storage Secrets
MinIO (if using MinIO for object storage):
kubectl create secret generic scopear-minio \ --namespace=<namespace> \ --from-literal=MINIO_ROOT_USER=<REDACTED> \ --from-literal=MINIO_ROOT_PASSWORD=<REDACTED>
AWS S3 Access Keys (if using AWS S3 w/o IAM Authentication):
For CMS Storage:
kubectl create secret generic scopear-cms-storage \ --namespace=<namespace> \ --from-literal=access_key=<REDACTED> \ --from-literal=secret_key=<REDACTED>
For C2 Storage:
kubectl create secret generic scopear-c2-storage \ --namespace=<namespace> \ --from-literal=access_key=<REDACTED> \ --from-literal=secret_key=<REDACTED>
Redis Secrets
Redis Auth Token (if using AWS Elasticache with authentication tokens):
kubectl create secret generic scopear-cms-redis \ --namespace=<namespace> \ --from-literal=token=<REDACTED>
TURN Server (Coturn) Secrets
If using Coturn for Remote Assist:
kubectl create secret generic scopear-turn \ --namespace=<namespace> \ --from-literal=username=<REDACTED> \ --from-literal=password=<REDACTED>
IoT Secrets
If using IoT:
kubectl create secret generic scopear-iot-mongodb \ --namespace=<namespace> \ --from-literal=mongodb_password=<REDACTED>