1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 21:46:22 +01:00

OSDOCS-14603-3: ESO assembly and modules

This commit is contained in:
aravipra
2025-06-13 21:07:27 +05:30
committed by openshift-cherrypick-robot
parent acb2c148c8
commit 2c8e57bf91
20 changed files with 847 additions and 2 deletions

View File

@@ -1254,6 +1254,14 @@ Topics:
Topics:
- Name: External Secrets Operator overview
File: index
- Name: External Secrets Operator release notes
File: external-secrets-operator-release-notes
- Name: Installing the External Secrets Operator
File: external-secrets-operator-install
- Name: Monitoring the External Secrets Operator
File: external-secrets-operator-monitoring
- Name: Uninstalling the External Secrets Operator
File: external-secrets-operator-uninstall
- Name: Viewing audit logs
File: audit-log-view
- Name: Configuring the audit log policy

View File

@@ -0,0 +1,27 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/index.adoc
:_mod-docs-content-type: CONCEPT
[id="external-secrets-about_{context}"]
= About the {external-secrets-operator}
Use the {external-secrets-operator} to integrate link:https://external-secrets.io/latest/[external-secrets] application with the {product-title} cluster. The `external-secrets` application fetches secrets stored in the external providers such as link:https://aws.amazon.com/secrets-manager/[AWS Secrets Manager], link:https://developer.hashicorp.com/vault[HashiCorp Vault], link:https://cloud.google.com/security/products/secret-manager[Google Secret Manager], link:https://azure.microsoft.com/en-us/products/key-vault/[Azure Key Vault], link:https://www.ibm.com/products/secrets-manager[{ibm-cloud-title} Secrets Manager], link:https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.html[AWS Systems Manager Parameter Store] and integrates them with Kubernetes in a secure manner.
Using the {external-secrets-operator-short} ensures the following:
* Decouples applications from the secret-lifecycle management.
* Centralizes secret storage to support compliance requirements.
* Enables secure and automated secret rotation.
* Supports multi-cloud secret sourcing with fine-grained access control.
* Centralizes and audits access control.
[IMPORTANT]
====
Do not attempt to use more than one {external-secrets-operator-short} in your cluster. If you have a community {external-secrets-operator-short} installed in your cluster, you must uninstall it before installing the {external-secrets-operator}.
====
For more information about `external-secrets` application, see link:https://external-secrets.io/latest/[external-secrets].
Use the {external-secrets-operator-short} to authenticate with the external secrets store, retrieve secrets, and inject the retrieved secrets into a native Kubernetes secret. This method removes the need for applications to directly access or manage external secrets.

View File

@@ -0,0 +1,88 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/external-secrets-operator-monitoring.adoc
:_mod-docs-content-type: PROCEDURE
[id="external-secrets-enable-metrics-operand_{context}"]
= Enabling monitoring for the External Secrets operand for Red Hat OpenShift by using a service monitor
Enable monitoring and metrics collection for the External Secrets operand by using a service monitor to perform the custom metrics scraping.
.Prerequisites
* You have access to the cluster with `cluster-admin` privileges.
* The External Secrets operand is installed.
.Procedure
. Enable cluster monitoring by labeling the External Secrets operand namespace by running the following command:
+
[source,terminal]
----
$ oc label namespace external-secrets openshift.io/cluster-monitoring=true
----
. Create a YAML file that defines the `Role`, `RoleBinding`, and `ServiceMonitor` objects:
+
.Example `monitoring.yaml` file
[source,yaml]
----
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: prometheus-k8s
namespace: external-secrets
rules:
- apiGroups:
- ""
resources:
- services
- endpoints
- pods
verbs:
- get
- list
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: prometheus-k8s
namespace: external-secrets
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: prometheus-k8s
subjects:
- kind: ServiceAccount
name: prometheus-k8s
namespace: external-secrets
---
apiVersion: monitoring.coreos.com/v1
kind: ServiceMonitor
metadata:
labels:
app: external-secrets
app.kubernetes.io/component: controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/name: external-secrets
name: external-secrets
namespace: external-secrets
spec:
endpoints:
- interval: 30s
port: tcp-prometheus-servicemonitor
scheme: http
selector:
matchLabels:
app.kubernetes.io/component: controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/name: external-secrets
----
. Create the `Role`, `RoleBinding`, and `ServiceMonitor` objects by running the following command:
+
[source,terminal]
----
$ oc create -f monitoring.yaml
----

View File

@@ -0,0 +1,89 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/external-secrets-operator-monitoring.adoc
:_mod-docs-content-type: PROCEDURE
[id="external-secrets-enable-metrics_{context}"]
= Enabling monitoring for the {external-secrets-operator} by using a service monitor
Enable monitoring and metrics collection for the {external-secrets-operator} by using a service monitor to perform the custom metrics scraping.
.Prerequisites
* You have access to the cluster with `cluster-admin` privileges.
* The {external-secrets-operator-short} is installed.
.Procedure
. Enable cluster monitoring by labeling the {external-secrets-operator-short} namespace by running the following command:
+
[source,terminal]
----
$ oc label namespace external-secrets-operator openshift.io/cluster-monitoring=true
----
. Create a YAML file that defines the `Role`, `RoleBinding`, and `ServiceMonitor` objects:
+
.Example `monitoring.yaml` file
[source,yaml]
----
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: prometheus-k8s
namespace: external-secrets-operator
rules:
- apiGroups:
- ""
resources:
- services
- endpoints
- pods
verbs:
- get
- list
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: prometheus-k8s
namespace: external-secrets-operator
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: prometheus-k8s
subjects:
- kind: ServiceAccount
name: prometheus-k8s
namespace: external-secrets-operator
---
apiVersion: monitoring.coreos.com/v1
kind: ServiceMonitor
metadata:
labels:
app: external-secrets
app.kubernetes.io/component: controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/name: external-secrets
name: external-secrets
namespace: external-secrets-operator
spec:
endpoints:
- interval: 30s
port: tcp-prometheus-servicemonitor
scheme: http
selector:
matchLabels:
app.kubernetes.io/component: controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/name: external-secrets
----
. Create the `Role`, `RoleBinding`, and `ServiceMonitor` objects by running the following command:
+
[source,terminal]
----
$ oc create -f monitoring.yaml
----

View File

@@ -0,0 +1,11 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/index.adoc
:_mod-docs-content-type: CONCEPT
[id="external-secrets-fips-support_{context}"]
= About FIPS compliance for {external-secrets-operator}
The {external-secrets-operator} supports FIPS compliance. When running on {product-title} in FIPS mode, {external-secrets-operator-short} uses the RHEL cryptographic libraries submitted to NIST for FIPS validation on the x86_64, ppc64le, and s390X architectures. For more information about the NIST validation program, see link:https://csrc.nist.gov/Projects/cryptographic-module-validation-program/validated-modules[Cryptographic module validation program]. For more information about the latest NIST status for the individual versions of the RHEL cryptographic libraries submitted for validation, see link:https://access.redhat.com/articles/2918071#fips-140-2-and-fips-140-3-2[Compliance activities and government standards].
To enable FIPS mode, install the {external-secrets-operator-short} on an {product-title} cluster that runs in FIPS mode. For more information, see "Do you need extra security for your cluster?".

View File

@@ -0,0 +1,86 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/external-secrets-operator-install.adoc
:_mod-docs-content-type: PROCEDURE
[id="external-secrets-operand-install-cli_{context}"]
= Installing the External Secrets operand for Red Hat OpenShift by using the CLI
You can use the command-line interface (CLI) to install the External Secrets operand.
.Prerequisites
* You have access to the cluster with `cluster-admin` privileges.
.Procedure
. Create a `externalsecrets.openshift.operator.io` object by defining a YAML file with the following content:
+
.Example `externalsecrets.yaml` file
[source,yaml]
----
apiVersion: operator.openshift.io/v1alpha1
kind: ExternalSecrets
metadata:
labels:
app.kubernetes.io/name: external-secrets-operator
name: cluster
spec: {}
----
+
For more information on spec configuration, see "External Secrets Operator for Red Hat OpenShift APIs".
. Create the `externalsecrets.openshift.operator.io` object by running the following command:
+
[source,terminal]
----
$ oc create -f externalsecrets.yaml
----
.Verification
. Verify that the `external-secrets` pods are running by entering the following command:
+
[source,terminal]
----
$ oc get pods -n external-secrets
----
+
.Example output
[source,terminal]
----
NAME READY STATUS RESTARTS AGE
external-secrets-75d47cb9c8-6p4n2 1/1 Running 0 4h5m
external-secrets-cert-controller-676444b897-qb6ft 1/1 Running 0 4h5m
external-secrets-webhook-b566658ff-7m4d5 1/1 Running 0 4h5m
----
. Verify that the `external-secrets-operator` deployment object reports a successful status by running the following command:
+
[source,terminal]
----
$ oc get externalsecrets.operator.openshift.io cluster -n external-secrets-operator -o jsonpath='{.status.conditions}' | jq .
----
+
.Example output
[source,terminal]
----
[
{
"lastTransitionTime": "2025-06-17T14:57:04Z",
"message": "",
"observedGeneration": 1,
"reason": "Ready",
"status": "False",
"type": "Degraded"
},
{
"lastTransitionTime": "2025-06-17T14:57:04Z",
"message": "reconciliation successful",
"observedGeneration": 1,
"reason": "Ready",
"status": "True",
"type": "Ready"
}
]
----

View File

@@ -0,0 +1,112 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/external-secrets-operator-install.adoc
:_mod-docs-content-type: PROCEDURE
[id="external-secrets-operator-install-cli_{context}"]
= Installing the {external-secrets-operator} by using the CLI
You can use the command-line interface (CLI) to install the {external-secrets-operator}.
.Prerequisites
* You have access to the cluster with `cluster-admin` privileges.
.Procedure
. Create a new project named `external-secrets-operator` by running the following command:
+
[source,terminal]
----
$ oc new-project external-secrets-operator
----
. Create an `OperatorGroup` object by defining a YAML file with the following content:
+
.Example `operatorGroup.yaml` file
[source,yaml]
----
apiVersion: operators.coreos.com/v1
kind: OperatorGroup
metadata:
name: openshift-external-secrets-operator
namespace: external-secrets-operator
spec:
targetNamespaces: []
----
. Create the `OperatorGroup` object by running the following command:
+
[source,terminal]
----
$ oc create -f operatorGroup.yaml
----
. Create a `Subscription` object by defining a YAML file with the following content:
+
.Example `subscription.yaml` file
[source,yaml]
----
apiVersion: operators.coreos.com/v1alpha1
kind: Subscription
metadata:
name: openshift-external-secrets-operator
namespace: external-secrets-operator
spec:
channel: tech-preview-v0.1
name: openshift-external-secrets-operator
source: redhat-operators
sourceNamespace: openshift-marketplace
installPlanApproval: Automatic
----
. Create the `Subscription` object by running the following command:
+
[source,terminal]
----
$ oc create -f subscription.yaml
----
.Verification
. Verify that the {olm} subscription is created by running the following command:
+
[source,terminal]
----
$ oc get subscription -n external-secrets-operator
----
+
.Example output
[source,terminal]
----
NAME PACKAGE SOURCE CHANNEL
openshift-external-secrets-operator openshift-external-secrets-operator eso-010-index tech-preview-v0.1
----
. Verify whether the Operator is successfully installed by running the following command:
+
[source,terminal]
----
$ oc get csv -n external-secrets-operator
----
+
.Example output
[source,terminal]
----
NAME DISPLAY VERSION REPLACES PHASE
external-secrets-operator.v0.1.0 External Secrets Operator for Red Hat OpenShift 0.1.0 Succeeded
----
. Verify that the status of the {external-secrets-operator-short} is Running by entering the following command:
+
[source,terminal]
----
$ oc get pods -n external-secrets-operator
----
+
.Example output
[source,terminal]
----
NAME READY STATUS RESTARTS AGE
external-secrets-operator-controller-manager-5699f4bc54-kbsmn 1/1 Running 0 25h
----

View File

@@ -0,0 +1,56 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/external-secrets-operator-install.adoc
:_mod-docs-content-type: PROCEDURE
[id="external-secrets-operator-install-console_{context}"]
= Installing the {external-secrets-operator} by using the web console
You can use the web console to install the {external-secrets-operator}.
.Prerequisites
* You have access to the cluster with `cluster-admin` privileges.
* You have access to the {product-title} web console.
.Procedure
. Log in to the {product-title} web console.
. Navigate to *Operators* -> *OperatorHub*.
. Enter *{external-secrets-operator-short}* in the search box.
. Select the *{external-secrets-operator}* from the generated list and click *Install*.
//+
//[NOTE]
//====
//place holder for TechPreview release details or See supported {external-secrets-operator-short} versions in the following "Additional resources" section.
//====
. On the *Install Operator* page:
.. Update the *Update channel*, if necessary. The channel defaults to *tech-preview-v0.1*, which installs the latest stable release of the {external-secrets-operator-short}.
.. Select the version from *Version* drop-down list.
.. Choose the *Installed Namespace* for the Operator.
+
* To use the default Operator namespace, select the *Operator recommended Namespace* option.
+
* To use the namespace that you created, select the *Select a Namespace* option, and then select the namespace from the drop-down list.
+
* If the default `external-secrets-operator` namespace does not exist, it is created for you by the {olm-first}.
+
.. Select an *Update approval* strategy.
+
* The *Automatic* strategy enables {olm} to automatically update the Operator when a new version is available.
+
* The *Manual* strategy requires a user with appropriate credentials to approve the Operator update.
.. Click *Install*.
.Verification
. Navigate to *Operators* -> *Installed Operators*.
. Verify that *{external-secrets-operator-short}* is listed with a *Status* of *Succeeded* in the `external-secrets-operator` namespace.

View File

@@ -0,0 +1,14 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/external-secrets-operator-install.adoc
:_mod-docs-content-type: PROCEDURE
[id="external-secrets-operator-limitations_{context}"]
= Limitations of {external-secrets-operator}
The following are the limitations of {external-secrets-operator} during the installation and uninstallation of the `external-secrets` application.
* Uninstalling the {external-secrets-operator} does not delete the resources created for `external-secrets` application. you must clean up the resources manually.
* When you add `cert-manager` Operator configurations in `externalsecrets.operator.openshift.io` object after creation, delete the `external-secrets-cert-controller` deployment resource manually to prevent degradation of the `external-secrets` application.
* Enable the `BitwardenSecretManagerProvider` field in `externalsecrets.operator.openshift.io` object only when installed on OpenShift Cluster running on x86_64 and arm64 architectures .
* Ensure `cert-manager` Operator is installed and operational before deploying the {external-secrets-operator} for seamless functioning. If you install the `cert-manager` Operator later, manually restart the `external-secrets-operator` pod to apply cert-manager configurations in `externalsecrets.operator.openshift.io` object.

View File

@@ -0,0 +1,27 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/external-secrets-operator-uninstall.adoc
:_mod-docs-content-type: PROCEDURE
[id="external-secrets-operator-uninstall-console_{context}"]
= Uninstalling the {external-secrets-operator} using the web console
You can uninstall the {external-secrets-operator} by using the web console.
.Prerequisites
* You have access to the cluster with `cluster-admin` privileges.
* You have access to the {product-title} web console.
* The {external-secrets-operator-short} is installed.
.Procedure
. Log in to the {product-title} web console.
. Uninstall the {external-secrets-operator} using the following steps:
.. Navigate to *Operators* -> *Installed Operators*.
.. Click the Options menu {kebab} next to the *{external-secrets-operator}* entry and click *Uninstall Operator*.
.. In the confirmation dialog, click *Uninstall*.

View File

@@ -0,0 +1,20 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/index.adoc
:_mod-docs-content-type: CONCEPT
[id="external-secrets-provider-types_{context}"]
= External secrets providers for the {external-secrets-operator}
The {external-secrets-operator} is tested with the following external secrets provider types:
* link:https://aws.amazon.com/secrets-manager/[AWS Secrets Manager]
* link:https://developer.hashicorp.com/vault[HashiCorp Vault]
* link:https://cloud.google.com/security/products/secret-manager[Google Secret Manager]
* link:https://azure.microsoft.com/en-us/products/key-vault/[Azure Key Vault]
* link:https://www.ibm.com/products/secrets-manager[{ibm-cloud-title} Secrets Manager]
[NOTE]
====
Red Hat does not test all factors associated with third-party secrets store provider functionality. For more information about third-party support, see the link:https://access.redhat.com/third-party-software-support[Red{nbsp}Hat third-party support policy].
====

View File

@@ -0,0 +1,43 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/external-secrets-operator-monitoring.adoc
:_mod-docs-content-type: PROCEDURE
[id="external-secrets-query-metrics_{context}"]
= Querying metrics for the {external-secrets-operator}
After you enable monitoring for the {external-secrets-operator}, you can query its metrics.
.Prerequisites
* You have access to the cluster as a user with the `cluster-admin` role.
* You installed the {external-secrets-operator-short}.
* You enabled monitoring and metrics collection for the {external-secrets-operator-short}.
.Procedure
. Find the endpoint value by running the following command:
+
[source,terminal]
----
$ oc describe service external-secrets -n external-secrets
----
. From the {product-title} web console, navigate to *Observe* -> *Metrics*.
. Add a query by using the following formats:
.. Specify the endpoints:
+
[source,promql]
----
{instance="<endpoint>"} <1>
----
<1> Replace `<endpoint>` with the value of the endpoint for the `external-secrets` service.
.. Specify the `tcp-prometheus-servicemonitor` port:
+
[source,promql]
----
{endpoint="tcp-prometheus-servicemonitor"}
----

View File

@@ -0,0 +1,36 @@
// Module included in the following assemblies:
//
// * security/external-secrets-operator-uninstall.adoc
:_mod-docs-content-type: PROCEDURE
[id="external-secrets-remove-resources-cli_{context}"]
= Removing {external-secrets-operator} resources by using the CLI
After you have uninstalled the {external-secrets-operator}, you can optionally eliminate its associated resources from your cluster by using the command-line interface (CLI).
.Prerequisites
* You have access to the cluster with `cluster-admin` privileges.
.Procedure
. Delete the deployments of the `external-secrets` application components in the `external-secrets` namespace by running the following command:
+
[source,terminal]
----
$ oc delete deployment -n external-secrets -l app=external-secrets
----
. Delete the custom resource definitions (CRDs) that were installed by the {external-secrets-operator-short} by running the following command:
+
[source,terminal]
----
$ oc delete customresourcedefinitions.apiextensions.k8s.io -l external-secrets.io/component=controller
----
. Delete the `external-secrets-operator` namespace by running the following command:
+
[source,terminal]
----
$ oc delete project external-secrets-operator
----

View File

@@ -0,0 +1,65 @@
// Module included in the following assemblies:
//
// * security/external-secrets-operator-uninstall.adoc
:_mod-docs-content-type: PROCEDURE
[id="external-secrets-remove-resources_{context}"]
= Removing {external-secrets-operator} resources by using the web console
After you have uninstalled the {external-secrets-operator}, you can optionally eliminate its associated resources from your cluster.
.Prerequisites
* You have access to the cluster with `cluster-admin` privileges.
* You have access to the {product-title} web console.
.Procedure
. Log in to the {product-title} web console.
. Remove the deployments of the `external-secrets` application components in the `external-secrets` namespace:
.. Click the *Project* drop-down menu to see a list of all available projects, and select the *external-secrets* project.
.. Navigate to *Workloads* -> *Deployments*.
.. Select the deployment that you want to delete.
.. Click the *Actions* drop-down menu, and select *Delete Deployment* to see a confirmation dialog box.
.. Click *Delete* to delete the deployment.
. Remove the custom resource definitions (CRDs) that were installed by the {external-secrets-operator-short} using the following steps:
.. Navigate to *Administration* -> *CustomResourceDefinitions*.
.. Choose `external-secrets.io/component: controller` from the suggestions in the *Label* field to filter the CRDs.
.. Click the Options menu {kebab} next to each of the following CRDs, and select *Delete Custom Resource Definition*:
*** ACRAccessToken
*** ClusterExternalSecret
*** ClusterGenerator
*** ClusterSecretStore
*** ECRAuthorizationToken
*** ExternalSecret
*** GCRAccessToken
*** GeneratorState
*** GithubAccessToken
*** Grafana
*** Password
*** PushSecret
*** QuayAccessToken
*** SecretStore
*** STSSessionToken
*** UUID
*** VaultDynamicSecret
*** Webhook
. Remove the `external-secrets-operator` namespace using the following steps:
.. Navigate to *Administration* -> *Namespaces*.
.. Click the Options menu {kebab} next to the *{external-secrets-operator-short}* and select *Delete Namespace*.
.. In the confirmation dialog, enter `external-secrets-operator` in the field and click *Delete*.

View File

@@ -0,0 +1,33 @@
// Module included in the following assemblies:
//
// * security/external_secrets_operator/index.adoc
:_mod-docs-content-type: CONCEPT
[id="external-secrets-test-coverage_{context}"]
= Testing external secrets provider types
The following table shows the the test coverage for each tested external secrets provider type.
[cols="1,1,1",options="header"]
|===
| Secrets Provider
| Test Status
| Notes
| AWS Secrets Manager
| Partially tested
| Ensures basic functionality.
| AWS Systems Manager Parameter Store
| Partially tested
| Ensures basic functionality.
| HashiCorp Vault
| Partially tested
|
| Google Secrets Manager
| Partially tested
|
|===

View File

@@ -0,0 +1,30 @@
:_mod-docs-content-type: ASSEMBLY
[id="external-secrets-operator-install"]
= Installing the {external-secrets-operator}
include::_attributes/common-attributes.adoc[]
:context: external-secrets-operator-install
toc::[]
The {external-secrets-operator} is not installed on the {product-title} by default. Install the {external-secrets-operator-short} by using either the web console or the command-line interface (CLI).
:FeatureName: The {external-secrets-operator}
include::snippets/technology-preview.adoc[leveloffset=+1]
//Limitations of application installation and uninstallation
include::modules/external-secrets-operator-limitations.adoc[leveloffset=+1]
//Installing the {external-secrets-operator} using the web console
include::modules/external-secrets-operator-install-console.adoc[leveloffset=+1]
//Installing using CLI
include::modules/external-secrets-operator-install-cli.adoc[leveloffset=+1]
[role="_additional-resources"]
[id="external-secrets-operator-install_additional-resources"]
== Additional resources
* xref:../../operators/admin/olm-adding-operators-to-cluster.adoc#olm-adding-operators-to-a-cluster[Adding Operators to a cluster]
//== Installing the external secrets operand using CLI
include::modules/external-secrets-operand-install-cli.adoc[leveloffset=+1]

View File

@@ -0,0 +1,26 @@
:_mod-docs-content-type: ASSEMBLY
[id="external-secrets-operator-monitoring"]
= Monitoring the {external-secrets-operator}
include::_attributes/common-attributes.adoc[]
:context: external-secrets-operator-monitoring
toc::[]
You can expose controller metrics for the {external-secrets-operator} in the format provided by the Prometheus Operator.
:FeatureName: The {external-secrets-operator}
include::snippets/technology-preview.adoc[leveloffset=+1]
// Enabling metrics for the {external-secrets-operator-short}
include::modules/external-secrets-enable-metrics.adoc[leveloffset=+1]
[role="_additional-resources"]
.Additional resources
* xref:../../observability/monitoring/configuring-user-workload-monitoring/configuring-metrics-uwm.adoc#setting-up-metrics-collection-for-user-defined-projects_configuring-metrics-uwm[Setting up metrics collection for user-defined projects]
// Querying metrics for the {external-secrets-operator-short}
include::modules/external-secrets-query-metrics.adoc[leveloffset=+1]
// Enabling metrics for the external secrets operand
include::modules/external-secrets-enable-metrics-operand.adoc[leveloffset=+1]

View File

@@ -0,0 +1,35 @@
:_mod-docs-content-type: ASSEMBLY
[id="external-secrets-operator-release-notes"]
= {external-secrets-operator} release notes
include::_attributes/common-attributes.adoc[]
:context: external-secrets-operator-release-notes
toc::[]
The {external-secrets-operator} is a cluster-wide service that provides lifecycle management for secrets fetched from external secret management systems.
These release notes track the development of {external-secrets-operator-short}.
:FeatureName: The {external-secrets-operator}
include::snippets/technology-preview.adoc[leveloffset=+1]
For more information, see xref:../../security/external_secrets_operator/index.adoc#external-secrets-operator-about[{external-secrets-operator-short} overview].
[id="external-secrets-operator-release-notes-0-1-0_{context}"]
== Release notes for {external-secrets-operator} 0.1.0 (Technology Preview)
Issued: 2025-06-26
The following advisories are available for the {external-secrets-operator} 0.1.0:
* link:https://access.redhat.com/errata/RHBA-2025:9747[RHBA-2025:9747]
* link:https://access.redhat.com/errata/RHBA-2025:9746[RHBA-2025:9746]
* link:https://access.redhat.com/errata/RHBA-2025:9757[RHBA-2025:9757]
* link:https://access.redhat.com/errata/RHBA-2025:9763[RHBA-2025:9763]
Version `0.1.0` of the {external-secrets-operator} is based on the upstream external-secrets version `0.14.3`. For more information, see the link:https://github.com/external-secrets/external-secrets/releases/tag/v0.14.3[external-secrets project release notes for v0.14.3].
[id="external-secrets-operator-0-1-0-features-enhancements_{context}"]
=== New features and enhancements
* This is the initial, Technology Preview release of the {external-secrets-operator}.

View File

@@ -0,0 +1,21 @@
:_mod-docs-content-type: ASSEMBLY
[id="external-secrets-operator-uninstall"]
= Uninstalling the {external-secrets-operator}
include::_attributes/common-attributes.adoc[]
:context: external-secrets-operator-uninstall
toc::[]
You can remove the {external-secrets-operator} from {product-title} by uninstalling the Operator and removing its related resources.
:FeatureName: The {external-secrets-operator}
include::snippets/technology-preview.adoc[leveloffset=+1]
// Uninstalling the {external-secrets-operator-short}
include::modules/external-secrets-operator-uninstall-console.adoc[leveloffset=+1]
// Removing {external-secrets-operator-short}
include::modules/external-secrets-remove-resources.adoc[leveloffset=+1]
// Removing {external-secrets-operator-short} using CLI
include::modules/external-secrets-remove-resources-cli.adoc[leveloffset=+1]

View File

@@ -6,10 +6,28 @@ include::_attributes/common-attributes.adoc[]
toc::[]
//Details to be added
The {external-secrets-operator} operates as a cluster-wide service to deploy and manage the `external-secrets` application. The `external-secrets` application integrates with external secrets management systems and performs secret fetching, refreshing, and provisioning within the cluster.
:FeatureName: The {external-secrets-operator}
include::snippets/technology-preview.adoc[leveloffset=+1]
//About the {external-secrets-operator}
include::modules/external-secrets-about.adoc[leveloffset=+1]
//About the external secrets provide types
include::modules/external-secrets-provider-types.adoc[leveloffset=+1]
//Test coverage table for tested provider type
include::modules/external-secrets-test-coverage.adoc[leveloffset=+1]
//FIPS compliant support
include::modules/external-secrets-fips-support.adoc[leveloffset=+1]
[role="_additional-resources"]
[id="external-secrets-operator-about_additional-resources"]
== Additional resources
// Details to be added
* link:https://external-secrets.io/latest/[external-secrets application]
* xref:../../security/container_security/security-compliance.adoc#security-compliance[Understanding compliance]
* xref:../../installing/overview/installing-fips.adoc#installing-fips-mode_installing-fips[Installing a cluster in FIPS mode]
* xref:../../installing/overview/installing-preparing.adoc#installing-preparing-security[Do you need extra security for your cluster?]