# External Secrets
----
The External Secrets Kubernetes operator reads information from a third party service
like [AWS Secrets Manager](https://aws.amazon.com/secrets-manager/) and automatically injects the values as [Kubernetes Secrets](https://kubernetes.io/docs/concepts/configuration/secret/).
Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this [issue](https://github.com/external-secrets/kubernetes-external-secrets/issues/47) and this [PR](https://github.com/external-secrets/kubernetes-external-secrets/pull/477).
# ⚠️ Please bear in mind
While this project is not ready, you might consider using the following:
- [Kubernetes External Secrets](https://github.com/external-secrets/kubernetes-external-secrets)
- [Secrets Manager](https://github.com/itscontained/secret-manager)
- [External Secrets Operator](https://github.com/ContainerSolutions/externalsecret-operator/)
## Installation
Clone this repository:
```shell
git clone https://github.com/external-secrets/external-secrets.git
```
Install the Custom Resource Definitions:
```shell
make install
```
Run the controller against the active Kubernetes cluster context:
```shell
make run
```
Apply the sample resources:
```shell
kubectl apply -f config/samples/external-secrets_v1alpha1_secretstore.yaml
kubectl apply -f config/samples/external-secrets_v1alpha1_externalsecret.yaml
```
We will add more documentation once we have the implementation for the different providers.
## Planned Features
- Support to multiple Provider stores (AWS Secret Manager, GCP Secret Manger, Vault and more) simultaneously.
- Multiple External Secrets operator instances for different contexts/environments.
- A custom refresh interval to sync the data from the Providers, syncing your Kubernetes Secrets up to date.
- Select specific versions of the Provider data.
## Kicked off by
![](assets/CS_logo_1.png)
![](assets/Godaddylogo_2020.png)