Some secrets used for different applications have been created manually in the cluster.
Using SealedSecrets seems like the best approach to manage them as code.
Another alternative would be External Secrets, but it would require a provider such as GCP Secret Manager at additional costs and secrets at this location would still need to be managed manually.
The list of the secrets that were applied manually are:
dex/dex
argocd/argocd-auth
prometheus-operator/prometheus-operator-grafana
Only the key admin-password
argo/argo-server-sso
argo/argo-workflows-webhook-clients
AC
Update the different README.md to reflect the changes
Some secrets used for different applications have been created manually in the cluster. Using SealedSecrets seems like the best approach to manage them as code.
Another alternative would be External Secrets, but it would require a provider such as GCP Secret Manager at additional costs and secrets at this location would still need to be managed manually.
The list of the secrets that were applied manually are:
admin-password
AC