full-secret-store.yaml 1.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
  1. apiVerson: external-secrets.io/v1alpha1
  2. kind: SecretStore
  3. metadata:
  4. name: example
  5. namespace: example-ns
  6. spec:
  7. # Used to select the correct ESO controller (think: ingress.ingressClassName)
  8. # The ESO controller is instantiated with a specific controller name and filters ES based on this property
  9. # Optional
  10. controller: dev
  11. # provider field contains the configuration to access the provider which contains the secret
  12. # exactly one provider must be configured.
  13. provider:
  14. # (1): AWS Secrets Manager
  15. # aws configures this store to sync secrets using AWS Secret Manager provider
  16. aws:
  17. service: SecretsManager
  18. # Role is a Role ARN which the SecretManager provider will assume
  19. role: iam-role
  20. # AWS Region to be used for the provider
  21. region: eu-central-1
  22. # Auth defines the information necessary to authenticate against AWS by
  23. # getting the accessKeyID and secretAccessKey from an already created Kubernetes Secret
  24. auth:
  25. secretRef:
  26. accessKeyID:
  27. name: awssm-secret
  28. key: access-key
  29. secretAccessKey:
  30. name: awssm-secret
  31. key: secret-access-key
  32. # (TODO): add more provider examples here
  33. status:
  34. # Standard condition schema
  35. conditions:
  36. # SecretStore ready condition indicates the given store is in ready
  37. # state and able to referenced by ExternalSecrets
  38. # If the `status` of this condition is `False`, ExternalSecret controllers
  39. # should prevent attempts to fetch secrets
  40. - type: Ready
  41. status: "False"
  42. reason: "ConfigError"
  43. message: "SecretStore validation failed"
  44. lastTransitionTime: "2019-08-12T12:33:02Z"