Secret. This workflow ensures sensitive data remains encrypted at rest and in version control.
Prerequisites
- A running Kubernetes cluster
kubesealCLI installed- Bitnami Sealed Secrets controller deployed in the
kube-systemnamespace sealed-secret.yamlcontaining your Secret definition
1. Encrypt and Apply the SealedSecret
First, seal (encrypt) your sealed-secret.yaml and then apply it:
Make sure the
--controller-name and --controller-namespace match your Sealed Secrets controller deployment.2. Verify the Decrypted Kubernetes Secret
Once the Sealed Secrets operator processes yourSealedSecret, it will create a standard Secret. List all Secrets to confirm:
| NAME | TYPE | DATA | AGE |
|---|---|---|---|
| database | Opaque | 1 | 13h |
| sealed-secrets-keymnn78 | kubernetes.io/tls | 2 | 14h |
3. Inspect the Secret Manifest
To view the full YAML of the decrypted Secret:4. Decode the Secret Value
Retrieve and decode your secret value directly:All data in a Kubernetes
Secret is base64-encoded. Use -o jsonpath and base64 -d to decode sensitive values.5. Monitor the Sealed Secrets Resource
You can also inspect the status of yourSealedSecret:
STATUS: True and SYNCED: True to confirm the operator successfully decrypted and created the Secret.