-
Notifications
You must be signed in to change notification settings - Fork 29
OAPE-392: Adds toolset to manage External Secrets Operator #91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
@bharath-b-rh: This pull request references OAPE-392 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
Skipping CI for Draft Pull Request. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: bharath-b-rh The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
PR needs rebase. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Add External Secrets Operator toolset for Red Hat OpenShift
Description
This PR adds a new
external-secretstoolset to the Kubernetes MCP Server, providing comprehensive support for managing the External Secrets Operator for Red Hat OpenShift.The External Secrets Operator synchronizes secrets from external secret management systems (AWS Secrets Manager, HashiCorp Vault, Google Cloud Secret Manager, Azure Key Vault, etc.) into Kubernetes Secrets.
Features
Operator Lifecycle Management
external_secrets_operator_install- Install the operator via OLM (Operator Lifecycle Manager)external_secrets_operator_status- Check operator installation status (Subscription, CSV, deployments)external_secrets_operator_uninstall- Uninstall the operatorexternal_secrets_config_get- Get ExternalSecretsConfig resourceexternal_secrets_config_apply- Apply/update ExternalSecretsConfigSecretStore Management
external_secrets_store_list- List SecretStores/ClusterSecretStoresexternal_secrets_store_get- Get store detailsexternal_secrets_store_create- Create/update storesexternal_secrets_store_delete- Delete storesexternal_secrets_store_validate- Validate store health and capabilitiesExternalSecret Management
external_secrets_list- List ExternalSecrets/ClusterExternalSecretsexternal_secrets_get- Get secret detailsexternal_secrets_create- Create/update external secretsexternal_secrets_delete- Delete external secretsexternal_secrets_sync_status- Check synchronization statusexternal_secrets_refresh- Trigger immediate refresh from providerDebugging & Monitoring
external_secrets_debug- Comprehensive debugging (operator status, store validation, sync status, events, logs)external_secrets_events- View related Kubernetes eventsexternal_secrets_logs- Get operator pod logsexternal_secrets_health- Quick health check summaryBuilt-in Documentation
external_secrets_guide- Provider-specific examples and best practices for AWS, GCP, Azure, Vault, Kubernetes providers, troubleshooting, and securityUsage
Enable the toolset with:
kubernetes-mcp-server --toolsets core,config,helm,external-secrets Or in MCP client configuration: