Skip to main content

Shift secrets for deployment configuration

Scope: Find here the main secrets available for a production KOBIL Shift deployment
Reference: Find additional info for the secrest in the KOBIL Shift README

To make use of secured handling for access credentials and sensivite parameter the KOBIL Shift Charts allows to make use of Secrets overruling the Chart configration parameter. This allows to create secrets content prior to the deployment and then to specify the secrets name (create in the targeted KOBIL Shift namespace) in the Charts.

Table of Secrets in Shift Chart

Parameter nameFunctionalityContentUpdatesComment
global.
  imagePullSecrets
Credential set for KOBIL Image repo accessdocker-registry type secret
for server, user, password
update in case of 
credential set reset/updates
See README
"imagePullSecret"
global.
  routing.
    tlsSecret
TLS-Endpoint Certificates Secretbase64 string 
covering Certs PEM
update in case of 
domain name changes
or validity of certs
Standard TLS endpoint secret
common.
  existingSecretDatastoreCredentials
Credential sets for KOBIL Services DB access
Multiple Credential Sets 
generic type secret for
Credential Sets plain text
update in case of 
credential set reset/updates
See README
"Required structure for datastore secrets"
common.
existingSecretAdminCredentials
Credential set for KOBIL IDP Service admin accountgeneric type secret for
Credential Sets plain text
update in case of 
credential set reset/updates
See README
"Required structure for admin credentials"
common.
datastores.
   database.
      tls.
        trustStore
→ store
Not covered by Secret - needs to be added 
to metaconfig completely
Truststore in base64update in case of 
domain name changes
or validity of certs
Standard Truststore secret
common.
datastores.
   kafka.
      external.tls
→ trustStoreSecret
TLS-session TrustStorebase64 string
covering full truststore
in PEM and PFX/pkcs12 format
update in case of kafka-service
hostname change or validity
Standard Truststore secret
common.
datastores.
   kafka.
   auth.username
→ password secret
Password for Credential set (given "username")base64 string
covering password
update in case of
credential set reset/updates
See README
"External Kafka clusters" and 
"Authentication"
ast.
existingSecretEncryptionKeys
Database and Communication encryption keys
DATABASE_ENCRYPTION_MASTER_KEY
SESSION_ENCRYPTION_MASTER_KEY
generic type secret for
Credential Sets plain text
MUST NOT BE CHANGEDSee README
"Required structure for encryption keys"
ast.
issuer.
existingSecretIssuerCA
Internal Certificate Authority Root Cert and Key
ISSUER_CA_CERTIFICATE 
ISSUER_CA_KEY
generic type secret for
Credential Sets plain text
MUST NOT BE CHANGEDSee README
"Required structure for issuer CA"

Further sample info from the KOBIL Shift README - section "Credentials and other sensitive data from existing Kubernetes secrets"

Required structure for admin credentials

Create a secret using below structure and add admin credentials for idp-core. Not used (disabled) services can be omitted.

apiVersion: v1
kind: Secret
metadata:
name: shift-admin-passwords
type: Generic
stringData:
IDP_CORE_ADMIN_USERNAME: "admin"
IDP_CORE_ADMIN_PASSWORD: "password"