Skip to main content

Secret Injection - Details

← Back to Secret Injection Tutorial

This document provides comprehensive information about secret injection, cloud integration, security best practices, and advanced features.

Detailed Documentation

Setup

We have a focused guide for creating secrets in your preferred cloud provider, check it out here.

Multiple Secrets

You can reference multiple secrets:

secrets:
- name: demo-http-echo-api-keys
- name: demo-http-echo-database-creds
- name: shared-service-secrets

All secrets are merged and injected as environment variables, so be mindful of naming conflicts.

Secret Rotation

The External Secrets Operator automatically syncs secrets from the cloud:

  • Default sync interval: 1 minute
  • On update: Kubernetes secret is updated
  • Pod restart: Required to pick up new values

ArgoCD has a useful Resource Action that triggers the Manual Refreshes flow for External Secrets.

ArgoCD view of an external secret's menu, which has the items 'Details ', 'Delete' and 'Refresh'ArgoCD view of an external secret's menu, which has the items 'Details ', 'Delete' and 'Refresh'