vault-iam-store-controller-pod-identity.yaml 988 B

123456789101112131415161718192021
  1. apiVersion: external-secrets.io/v1
  2. kind: SecretStore
  3. metadata:
  4. name: vault-backend-aws-iam
  5. spec:
  6. provider:
  7. vault:
  8. server: "http://my.vault.server:8200"
  9. path: secret
  10. version: v2
  11. namespace: <vault_namespace>
  12. auth:
  13. iam:
  14. # Path where the AWS auth method is enabled in Vault, e.g: "aws/". Defaults to aws
  15. path: aws
  16. # AWS Region. Defaults to us-east-1
  17. region: us-east-1
  18. # Vault Role. In vault, a role describes an identity with a set of permissions, groups, or policies you want to attach a user of the secrets engine
  19. vaultRole: vault-role-for-aws-iam-auth
  20. # Optional. Placeholder to supply header X-Vault-AWS-IAM-Server-ID. It is an additional (optional) header used by Vault IAM auth method to mitigate against different types of replay attacks. More details here: https://developer.hashicorp.com/vault/docs/auth/aws
  21. vaultAwsIamServerID: example-vaultAwsIamServerID