Secret management with Key Protect¶
Key Protect is a tool that provides centralized management of encryption keys and sensitive information. Key Protect manages two different types of keys: root keys and standard keys.
Root keys are used to encrypt information in other systems, like the etcd database of the cluster, or data in Object Storage, or a MongoDB database. The details of which are the subject for a different article.
Standard keys are used to store any kind of protected information. The Key Protect plugin reads the contents of a standard key, identified by a given key id, and stores the key value into a secret in the cluster.
Getting the Key Protect instance id¶
-
Set the target resource group and region for the Key Protect instance.
ibmcloud target -g {RESOURCE_GROUP} -r {REGION} -
List the available resources and find the name of the Key Protect instance.
ibmcloud resource service-instances -
List the details for the Key Protect instance. The
Key Protect instance idis listed asGUID.ibmcloud resource service-instance {INSTANCE_NAME}
Creating a standard key¶
-
Open the IBM Cloud console and navigate to the Key Protect service
-
Within Key Protect, select the Manage Keys tab
-
Press the
Add keybutton to open the "Add a new key" dialog -
Select the
Import your own keyradio button andStandard keyfrom the drop down -
Provide a descriptive name for the key and paste the base-64 encoded value of the key into the
Key materialfieldNote: A value can be encoded as base-64 from the terminal with the following command:
echo -n "{VALUE}" | base64If you need to encode a larger value, create the value in a file and encode the entire contents of the file with:
cat {file} | base64 -
Click Import key to create the key
-
Copy the value of the ID