| 123456789101112131415161718192021222324252627282930313233343536373839404142 |
- {% raw %}
- apiVersion: external-secrets.io/v1alpha1
- kind: PushSecret
- metadata:
- name: pushsecret-example # Customisable
- namespace: default # Same of the SecretStores
- spec:
- updatePolicy: Replace # Policy to overwrite existing secrets in the provider on sync
- deletionPolicy: Delete # the provider' secret will be deleted if the PushSecret is deleted
- refreshInterval: 1h # Refresh interval for which push secret will reconcile
- secretStoreRefs: # A list of secret stores to push secrets to
- - name: aws-parameterstore
- kind: SecretStore
- selector:
- secret:
- name: pokedex-credentials # Source Kubernetes secret to be pushed
- # Alternatively, you can point to a generator that produces values to be pushed
- generatorRef:
- apiVersion: external-secrets.io/v1alpha1
- kind: ECRAuthorizationToken
- name: prod-registry-credentials
- template:
- metadata:
- annotations: { }
- labels: { }
- data:
- best-pokemon: "{{ .best-pokemon | toString | upper }} is the really best!"
- # Uses an existing template from configmap
- # Secret is fetched, merged and templated within the referenced configMap data
- # It does not update the configmap, it creates a secret with: data["alertmanager.yml"] = ...result...
- templateFrom:
- - configMap:
- name: application-config-tmpl
- items:
- - key: config.yml
- data:
- - conversionStrategy: None # Also supports the ReverseUnicode strategy
- match:
- secretKey: best-pokemon # Source Kubernetes secret key to be pushed
- remoteRef:
- remoteKey: my-first-parameter # Remote reference (where the secret is going to be pushed)
- {% endraw %}
|