| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849 |
- apiVerson: external-secrets.io/v1alpha1
- kind: SecretStore
- metadata:
- name: example
- namespace: example-ns
- spec:
- # Used to select the correct ESO controller (think: ingress.ingressClassName)
- # The ESO controller is instantiated with a specific controller name and filters ES based on this property
- # Optional
- controller: dev
- # provider field contains the configuration to access the provider which contains the secret
- # exactly one provider must be configured.
- provider:
- # (1): AWS Secrets Manager
- # aws configures this store to sync secrets using AWS Secret Manager provider
- aws:
- service: SecretsManager
- # Role is a Role ARN which the SecretManager provider will assume
- role: iam-role
- # AWS Region to be used for the provider
- region: eu-central-1
- # Auth defines the information necessary to authenticate against AWS by
- # getting the accessKeyID and secretAccessKey from an already created Kubernetes Secret
- auth:
- secretRef:
- accessKeyID:
- name: awssm-secret
- key: access-key
- secretAccessKey:
- name: awssm-secret
- key: secret-access-key
- # (TODO): add more provider examples here
- status:
- # Standard condition schema
- conditions:
- # SecretStore ready condition indicates the given store is in ready
- # state and able to referenced by ExternalSecrets
- # If the `status` of this condition is `False`, ExternalSecret controllers
- # should prevent attempts to fetch secrets
- - type: Ready
- status: "False"
- reason: "ConfigError"
- message: "SecretStore validation failed"
- lastTransitionTime: "2019-08-12T12:33:02Z"
|