Skip to content
This repository was archived by the owner on Jul 26, 2022. It is now read-only.

Commit ad67ed0

Browse files
authored
chore(docs): Expand SSM Parameter Store docs to clarify use of version constraints (#894)
* chore(docs): Clarify use of SSM versions * chore(docs): Fix typo * chore(docs): Fix typo
1 parent 04b9091 commit ad67ed0

File tree

1 file changed

+22
-1
lines changed

1 file changed

+22
-1
lines changed

README.md

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -561,7 +561,7 @@ spec:
561561

562562
You can scrape values from SSM Parameter Store individually or by providing a path to fetch all keys inside.
563563

564-
Additionally you can also scrape all sub paths (child paths) if you need to. The default is not to scrape child paths
564+
When fetching all keys by path, you can also recursively scrape all the sub paths (child paths) if you need to. The default is not to scrape child paths.
565565

566566
```yml
567567
apiVersion: kubernetes-client.io/v1
@@ -580,6 +580,27 @@ spec:
580580
- path: /extra-people/
581581
recursive: false
582582
```
583+
584+
`data` and `dataFrom` retrieve the latest version of the parameter by default. If you want to get values for a specific version, you can append the version number to the key:
585+
586+
```yml
587+
apiVersion: kubernetes-client.io/v1
588+
kind: ExternalSecret
589+
metadata:
590+
name: hello-service
591+
spec:
592+
backendType: systemManager
593+
# optional: specify role to assume when retrieving the data
594+
roleArn: arn:aws:iam::123456789012:role/test-role
595+
# optional: specify region
596+
region: us-east-1
597+
dataFrom:
598+
- hello-service/credentials:3
599+
data:
600+
- key: /foo/name
601+
name: fooName:5
602+
```
603+
583604
### Akeyless Vault
584605

585606
kubernetes-external-secrets supports fetching secrets from [Akeyless Vault](https://www.akeyless.io/), .

0 commit comments

Comments
 (0)