You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: self-hosting/govern/external-secrets.mdx
+49-51Lines changed: 49 additions & 51 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,51 +74,50 @@ This guide explains how to integrate Plane with external secret management solut
74
74
75
75
9. Apply the following YAML to create a ClusterSecretStore resource:
76
76
```yaml
77
-
apiVersion: external-secrets.io/v1beta1
77
+
apiVersion: external-secrets.io/v1
78
78
kind: ClusterSecretStore
79
79
metadata:
80
-
name: cluster-aws-secretsmanager
80
+
name: cluster-aws-secretsmanager
81
+
namespace: <application_namespace>
81
82
spec:
82
-
provider:
83
+
provider:
83
84
aws:
84
-
service: SecretsManager
85
-
role: arn:aws:iam::<ACCOUNT-ID>:role/<IAM ROLE>
86
-
region: eu-west-1
87
-
auth:
88
-
secretRef:
85
+
service: SecretsManager
86
+
role: arn:aws:iam::<ACCOUNT-ID>:role/<IAM ROLE>
87
+
region: eu-west-1
88
+
auth:
89
89
accessKeyIDSecretRef:
90
-
name: aws-creds-secret
91
-
key: access-key
90
+
name: aws-creds-secret
91
+
key: access-key
92
92
secretAccessKeySecretRef:
93
-
name: aws-creds-secret
94
-
key: secret-access-key
93
+
name: aws-creds-secret
94
+
key: secret-access-key
95
95
```
96
96
Replace `<ACCOUNT-ID>` and `<IAM ROLE>` with your AWS account ID and the role name created in Step 5.
97
97
98
98
10. Create an ExternalSecret resource to fetch secrets from AWS and create a corresponding Kubernetes secret:
99
99
```yaml
100
-
apiVersion: external-secrets.io/v1beta1
100
+
apiVersion: external-secrets.io/v1
101
101
kind: ExternalSecret
102
102
metadata:
103
-
name: secret
104
-
namespace: <application_namespace>
103
+
name: rabbitmq-external-secrets
104
+
namespace: <application_namespace>
105
105
spec:
106
-
refreshInterval: 1m
107
-
secretStoreRef:
106
+
refreshInterval: 1m
107
+
secretStoreRef:
108
108
name: cluster-aws-secretsmanager # ClusterSecretStore name
109
109
kind: ClusterSecretStore
110
-
target:
110
+
target:
111
111
name: rabbitmq-secret # Target Kubernetes secret name
112
112
creationPolicy: Owner
113
-
data:
114
-
- secretKey: RABBITMQ_DEFAULT_USER # Specifies the key name for the secret value in the Kubernetes secret.
113
+
data:
114
+
- secretKey: RABBITMQ_DEFAULT_USER
115
115
remoteRef:
116
-
key: prod/secrets/rabbitmq # Specifies the name to the secret in the AWS Secrets Manager
117
-
property: RABBITMQ_DEFAULT_USER # Specifies the name of the secret property to retrieve from the AWS Secrets Manager
118
-
- secretKey: RABBITMQ_DEFAULT_PASS
116
+
key: prod/secrets/rabbitmq
117
+
property: RABBITMQ_DEFAULT_USER
118
+
- secretKey: RABBITMQ_DEFAULT_PASS
119
119
remoteRef:
120
-
key: prod/secrets/rabbitmq
121
-
property: RABBITMQ_DEFAULT_PASS
120
+
key: prod/secrets/rabbitmq
122
121
```
123
122
124
123
Make sure to set all [environment variables](/self-hosting/methods/kubernetes#external-secrets-config) in the AWS Secrets Manager, and then access them via ExternalSecret resources in your Kubernetes cluster.
@@ -145,49 +144,48 @@ Make sure to set all [environment variables](/self-hosting/methods/kubernetes#ex
145
144
146
145
5. Apply the following YAML to create a ClusterSecretStore resource:
147
146
```yaml
148
-
# cluster-store.yaml
149
-
apiVersion: external-secrets.io/v1beta1
150
-
kind: ClusterSecretStore
147
+
apiVersion: external-secrets.io/v1
148
+
kind: ClusterSecretStore
151
149
metadata:
152
-
name: vault-backend
150
+
name: vault-backend
151
+
namespace: <application_namespace>
153
152
spec:
154
-
provider:
155
-
vault:
156
-
server: "https://<vault-domain>" #the address of your vault instance
157
-
path: "secrets" #path for accessing the secrets
158
-
version: "v2" #Vault API version
159
-
auth:
153
+
provider:
154
+
vault:
155
+
server: "https://<vault-domain>" #the address of your vault instance
156
+
path: "secrets" #path for accessing the secrets
157
+
version: "v2" #Vault API version
158
+
auth:
160
159
tokenSecretRef:
161
-
name: "vault-token" #Use a k8s secret called vault-token
162
-
key: "token" #Use this key to access the vault token
160
+
name: "vault-token" #Use a k8s secret called vault-token
161
+
key: "token" #Use this key to access the vault token
163
162
```
164
163
165
164
Replace `<vault-domain>` with your Vault server address.
166
165
167
166
6. Create an ExternalSecret resource to fetch secrets from Vault and create a corresponding Kubernetes secret:
0 commit comments