You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jul 26, 2022. It is now read-only.
Copy file name to clipboardExpand all lines: README.md
+32-33Lines changed: 32 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -713,6 +713,38 @@ Create the policy binding:
713
713
714
714
gcloud iam service-accounts add-iam-policy-binding --role roles/iam.workloadIdentityUser --member "serviceAccount:$CLUSTER_PROJECT.svc.id.goog[$SECRETS_NAMESPACE/kubernetes-external-secrets]" my-secrets-sa@$PROJECT.iam.gserviceaccount.com
715
715
716
+
##### Deploy kubernetes-external-secrets using a service account key
717
+
718
+
Alternatively you can create and mount a kubernetes secret containing google service account credentials and set the GOOGLE_APPLICATION_CREDENTIALS env variable.
719
+
720
+
Create a Kubernetes secret called gcp-creds with a JSON keyfile from a service account with necessary credentials to access the secrets:
721
+
722
+
apiVersion: v1
723
+
kind: Secret
724
+
metadata:
725
+
name: mysecret
726
+
type: Opaque
727
+
stringData:
728
+
gcp-creds.json: |-
729
+
$KEYFILE_CONTENT
730
+
731
+
Uncomment GOOGLE_APPLICATION_CREDENTIALS in the values file as well as the following section:
732
+
733
+
env:
734
+
AWS_REGION: us-west-2
735
+
POLLER_INTERVAL_MILLISECONDS: 10000# Caution, setting this frequency may incur additional charges on some platforms
This will mount the secret at /app/gcp-creds/gcp-creds.json and make it available via the GOOGLE_APPLICATION_CREDENTIALS environment variable.
747
+
716
748
### IBM Cloud Secrets Manager
717
749
718
750
kubernetes-external-secrets supports fetching secrets from [IBM Cloud Secrets Manager](https://cloud.ibm.com/catalog/services/secrets-manager)
@@ -749,39 +781,6 @@ spec:
749
781
secretType: username_password
750
782
```
751
783
752
-
753
-
##### Deploy kubernetes-external-secrets using a service account key
754
-
755
-
Alternatively you can create and mount a kubernetes secret containing google service account credentials and set the GOOGLE_APPLICATION_CREDENTIALS env variable.
756
-
757
-
Create a Kubernetes secret called gcp-creds with a JSON keyfile from a service account with necessary credentials to access the secrets:
758
-
759
-
apiVersion: v1
760
-
kind: Secret
761
-
metadata:
762
-
name: mysecret
763
-
type: Opaque
764
-
stringData:
765
-
gcp-creds.json: |-
766
-
$KEYFILE_CONTENT
767
-
768
-
Uncomment GOOGLE_APPLICATION_CREDENTIALS in the values file as well as the following section:
769
-
770
-
env:
771
-
AWS_REGION: us-west-2
772
-
POLLER_INTERVAL_MILLISECONDS: 10000# Caution, setting this frequency may incur additional charges on some platforms
0 commit comments