full-cluster-secret-store.yaml 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. apiVersion: external-secrets.io/v1alpha1
  2. kind: ClusterSecretStore
  3. metadata:
  4. name: example
  5. spec:
  6. # Used to select the correct ESO controller (think: ingress.ingressClassName)
  7. # The ESO controller is instantiated with a specific controller name
  8. # and filters ES based on this property
  9. # Optional
  10. controller: dev
  11. # provider field contains the configuration to access the provider
  12. # which contains the secret exactly one provider must be configured.
  13. provider:
  14. # (1): AWS Secrets Manager
  15. # aws configures this store to sync secrets using AWS Secret Manager provider
  16. aws:
  17. service: SecretsManager
  18. # Role is a Role ARN which the SecretManager provider will assume
  19. role: iam-role
  20. # AWS Region to be used for the provider
  21. region: eu-central-1
  22. # Auth defines the information necessary to authenticate against AWS by
  23. # getting the accessKeyID and secretAccessKey from an already created Kubernetes Secret
  24. auth:
  25. secretRef:
  26. accessKeyID:
  27. name: awssm-secret
  28. key: access-key
  29. secretAccessKey:
  30. name: awssm-secret
  31. key: secret-access-key
  32. vault:
  33. server: "https://vault.acme.org"
  34. # Path is the mount path of the Vault KV backend endpoint
  35. path: "secret"
  36. # Version is the Vault KV secret engine version.
  37. # This can be either "v1" or "v2", defaults to "v2"
  38. version: "v2"
  39. # vault enterprise namespace: https://www.vaultproject.io/docs/enterprise/namespaces
  40. namespace: "a-team"
  41. caBundle: "..."
  42. auth:
  43. # static token: https://www.vaultproject.io/docs/auth/token
  44. tokenSecretRef:
  45. name: "my-secret"
  46. namespace: "secret-admin"
  47. key: "vault-token"
  48. # AppRole auth: https://www.vaultproject.io/docs/auth/approle
  49. appRole:
  50. path: "approle"
  51. roleId: "db02de05-fa39-4855-059b-67221c5c2f63"
  52. secretRef:
  53. name: "my-secret"
  54. namespace: "secret-admin"
  55. key: "vault-token"
  56. # Kubernetes auth: https://www.vaultproject.io/docs/auth/kubernetes
  57. kubernetes:
  58. mountPath: "kubernetes"
  59. role: "demo"
  60. # Optional service account reference
  61. serviceAccountRef:
  62. name: "my-sa"
  63. namespace: "secret-admin"
  64. # Optional secret field containing a Kubernetes ServiceAccount JWT
  65. # used for authenticating with Vault
  66. secretRef:
  67. name: "my-secret"
  68. namespace: "secret-admin"
  69. key: "vault"
  70. # (2): GCP Secret Manager
  71. gcpsm:
  72. # Auth defines the information necessary to authenticate against GCP by getting
  73. # the credentials from an already created Kubernetes Secret.
  74. auth:
  75. secretRef:
  76. secretAccessKeySecretRef:
  77. name: gcpsm-secret
  78. key: secret-access-credentials
  79. namespace: example
  80. projectID: myproject
  81. # (TODO): add more provider examples here
  82. status:
  83. # Standard condition schema
  84. conditions:
  85. # SecretStore ready condition indicates the given store is in ready
  86. # state and able to referenced by ExternalSecrets
  87. # If the `status` of this condition is `False`, ExternalSecret controllers
  88. # should prevent attempts to fetch secrets
  89. - type: Ready
  90. status: "False"
  91. reason: "ConfigError"
  92. message: "SecretStore validation failed"
  93. lastTransitionTime: "2019-08-12T12:33:02Z"