vault-iam-store-static-creds.yaml 1.5 KB

123456789101112131415161718192021222324252627282930313233
  1. apiVersion: external-secrets.io/v1
  2. kind: SecretStore
  3. metadata:
  4. name: vault-backend-aws-iam
  5. spec:
  6. provider:
  7. vault:
  8. server: "http://my.vault.server:8200"
  9. path: secret
  10. version: v2
  11. namespace: <vault_namespace>
  12. auth:
  13. iam:
  14. # Path where the AWS auth method is enabled in Vault, e.g: "aws/". Defaults to aws
  15. path: aws
  16. # AWS Region. Defaults to us-east-1
  17. region: us-east-1
  18. # optional: assume role before fetching secrets
  19. role: arn:aws:iam::1234567890:role/role-a
  20. # Vault Role. In vault, a role describes an identity with a set of permissions, groups, or policies you want to attach a user of the secrets engine
  21. vaultRole: vault-role-for-aws-iam-auth
  22. # Optional. Placeholder to supply header X-Vault-AWS-IAM-Server-ID. It is an additional (optional) header used by Vault IAM auth method to mitigate against different types of replay attacks. More details here: https://developer.hashicorp.com/vault/docs/auth/aws
  23. vaultAwsIamServerID: example-vaultAwsIamServerID
  24. secretRef: #Use this method when you have static AWS creds.
  25. accessKeyIDSecretRef:
  26. name: vault-iam-creds-secret
  27. key: access-key
  28. secretAccessKeySecretRef:
  29. name: vault-iam-creds-secret
  30. key: secret-access-key
  31. sessionTokenSecretRef:
  32. name: vault-iam-creds-secret
  33. key: secret-session-token