Verification
This topic provides steps to verify that the integration with Kubernetes ESO (External Secrets Operator) retrieves a secret from Secret Server or Secret Server on the Delinea Platform and injects the retrieved secret value into a Kubernetes Secret.
Retrieving a Secret
-
To retrieve a secret from Secret Server, run:
kubectl get externalsecret <ExternalConfiguration-name> -o yaml<ExternalConfiguration-name>is the name of theExternalSecretconfiguration (the value of themetadata.namefield in theExternalSecretconfiguration YAML file) that specifies the secret to fetch from Secret Server or from Secret Server on the Delinea Platform.The returned secret value is injected into a Kubernetes Secret and is stored in
data.SecretServerValueas a base-64 encoded string, for example:CopyapiVersion: v1
data:
SecretServerValue: <base64-encoded-value>
kind: Secret
metadata:
creationTimestamp: "2024-11-19T18:23:45Z"
name: SecretServerValue
namespace: default
type: Opaque
.
.
. -
To decode the base-64 encoded value, run:
echo "<base64-encoded-value>" | base64 --decode | jqFor example, if the base-64 value in
SecretServerValueisdGVzdC12YWx1ZQ==, run:echo "dGVzdC12YWx1ZQ==" | base64 --decodeThis returns the actual secret value (for example,
test-value).
Retrieving the Secret Details
To retrieve the details of a secret from Secret Server or the Delinea Platform, run:
kubectl describe externalsecret <ExternalConfiguration-name>
<ExternalConfiguration-name> is the name of the ExternalSecret configuration (the value of the metadata.name field in the ExternalSecret configuration YAML file) that specifies the secret to fetch from Secret Server or from Secret Server on the Delinea Platform.