Secret management with Key Protect
Key Protect is a tool that provides centralized management of encryption keys
and sensitive information. Key Protect manages two different types of keys: root keys and standard keys.
Root keys are used to encrypt information in other systems, like the etcd database of the cluster, or data in Object Storage, or a MongoDB database. The details of
which are the subject for a different article.
Standard keys are used to store any kind of protected information. The Key Protect plugin reads the contents of a standard key, identified by a given key id, and
stores the key value into a secret in the cluster.
Getting the Key Protect instance id
Set the target resource group and region for the Key Protect instance.
ibmcloud target -g {RESOURCE_GROUP} -r {REGION}List the available resources and find the name of the Key Protect instance.
ibmcloud resource service-instancesList the details for the Key Protect instance. The
Key Protect instance idis listed asGUID.ibmcloud resource service-instance {INSTANCE_NAME}
Creating a standard key
Open the IBM Cloud console and navigate to the Key Protect service
Within Key Protect, select the Manage Keys tab
Press the
Add keybutton to open the “Add a new key” dialogSelect the
Import your own keyradio button andStandard keyfrom the drop downProvide a descriptive name for the key and paste the base-64 encoded value of the key into the
Key materialfieldNote: A value can be encoded as base-64 from the terminal with the following command:
echo -n "{VALUE}" | base64If you need to encode a larger value, create the value in a file and encode the entire contents of the file with:
cat {file} | base64Click Import key to create the key
Copy the value of the ID