Skip to content

Commit 3bed53c

Browse files
Apply suggestion from @alicejgibbons
Co-authored-by: Alice Gibbons <[email protected]> Signed-off-by: Mirel <[email protected]>
1 parent 666ec9e commit 3bed53c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

daprdocs/content/en/reference/components-reference/supported-secret-stores/aws-secret-manager.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ The above example uses secrets as plain strings. It is recommended to use a loca
4545
| accessKey | Y | The AWS Access Key to access this resource | `"key"` |
4646
| secretKey | Y | The AWS Secret Access Key to access this resource | `"secretAccessKey"` |
4747
| sessionToken | N | The AWS session token to use | `"sessionToken"` |
48-
| multipleKeyValuesPerSecret | N | `"true"` sets the multipleKeyValuesPerSecret behavior. Allows parsing JSON objects stored as secrets into multiple key-value pairs. Defaults to `"false"` | `"true"` |
48+
| multipleKeyValuesPerSecret | N | When set to `"true"` allows for multiple key value pairs to be stored in a single secret. Defaults to `"false"` | `"true"` |
4949
5050
{{% alert title="Important" color="warning" %}}
5151
When running the Dapr sidecar (daprd) with your application on EKS (AWS Kubernetes), if you're using a node/pod that has already been attached to an IAM policy defining access to AWS resources, you **must not** provide AWS access-key, secret-key, and tokens in the definition of the component spec you're using.

0 commit comments

Comments
 (0)