<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Atomic on luvandre</title><link>https://luvandre.com/tags/atomic/</link><description>Recent content in Atomic on luvandre</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 19 Jan 2026 16:59:57 +0000</lastBuildDate><atom:link href="https://luvandre.com/tags/atomic/index.xml" rel="self" type="application/rss+xml"/><item><title>Create onepassword-token For k8s</title><link>https://luvandre.com/notes/202601191659/</link><pubDate>Mon, 19 Jan 2026 16:59:57 +0000</pubDate><guid>https://luvandre.com/notes/202601191659/</guid><description>&lt;div class="highlight">&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-bash" data-lang="bash">&lt;span style="display:flex;">&lt;span>k create secret generic onepassword-connect-secret &lt;span style="color:#ae81ff">\
&lt;/span>&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#ae81ff">&lt;/span>--from-file&lt;span style="color:#f92672">=&lt;/span>./1password-credentials.json -o yaml &amp;gt; infrastructure/configs/base/onepassword-connect/1_secrets.yaml
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-bash" data-lang="bash">&lt;span style="display:flex;">&lt;span>kubectl create secret generic onepassword-connect-secret -n onepassword --from-literal&lt;span style="color:#f92672">=&lt;/span>1password-credentials.json&lt;span style="color:#f92672">=&lt;/span>&lt;span style="color:#e6db74">&amp;#34;&lt;/span>&lt;span style="color:#66d9ef">$(&lt;/span>cat ./utils/1password-credentials.json | base64&lt;span style="color:#66d9ef">)&lt;/span>&lt;span style="color:#e6db74">&amp;#34;&lt;/span> --dry-run&lt;span style="color:#f92672">=&lt;/span>client -o yaml &amp;gt; infrastructure/configs/base/onepassword-connect/1_secrets.yaml
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-bash" data-lang="bash">&lt;span style="display:flex;">&lt;span>kubectl create secret -n external-secrets generic onepassword-token --from-literal&lt;span style="color:#f92672">=&lt;/span>token&lt;span style="color:#f92672">=&lt;/span>$OP_CONNECT_TOKEN
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div></description></item><item><title>Encrypt secrets with SOPS</title><link>https://luvandre.com/notes/202601152309/</link><pubDate>Thu, 15 Jan 2026 23:09:41 +0000</pubDate><guid>https://luvandre.com/notes/202601152309/</guid><description>&lt;p>Generate an age keypair and save it to &lt;code>age.agekey&lt;/code>. The public key is used for encryption; keep the private key safe — you&amp;rsquo;ll need it to decrypt.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-bash" data-lang="bash">&lt;span style="display:flex;">&lt;span>$ age-keygen -o age.agekey
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>Public key: age1helqcqsh9464r8chnwc2fzj8uv7vr5ntnsft0tn45v2xtz0hpfwq98cmsg
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Store the private key as a Kubernetes secret in the &lt;code>flux-system&lt;/code> namespace so Flux&amp;rsquo;s SOPS decryption provider can use it to decrypt manifests at apply time.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-sh" data-lang="sh">&lt;span style="display:flex;">&lt;span>cat age.agekey |
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>kubectl create secret generic sops-age &lt;span style="color:#ae81ff">\
&lt;/span>&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#ae81ff">&lt;/span>--namespace&lt;span style="color:#f92672">=&lt;/span>flux-system &lt;span style="color:#ae81ff">\
&lt;/span>&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#ae81ff">&lt;/span>--from-file&lt;span style="color:#f92672">=&lt;/span>age.agekey&lt;span style="color:#f92672">=&lt;/span>/dev/stdin
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Encrypt a Kubernetes secret YAML in-place using SOPS. Only fields matching &lt;code>data&lt;/code> or &lt;code>stringData&lt;/code> are encrypted, leaving the rest of the manifest readable.&lt;/p></description></item></channel></rss>