You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: self-hosting/govern/external-secrets.mdx
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,9 +7,9 @@ This guide explains how to integrate Plane with external secret management solut
7
7
8
8
## AWS Secrets Manager
9
9
10
-
1. Create a dedicated IAM user (e.g., `external-secret-access-user`).
11
-
2. Generate security credentials (no Console Access required).
12
-
3. Note the user's ARN for later use.
10
+
1. Create a dedicated IAM user (e.g., `external-secret-access-user`). You can uncheck **Console Access Required**.
11
+
2. Generate `ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` and keep them handy.
12
+
3. Note the user's ARN for later use (format: `arn:aws:iam::<account-id>:user/<user-name>`).
13
13
14
14
4. Create IAM policy (e.g., `external-secret-access-policy`) with the following JSON:
15
15
@@ -52,9 +52,10 @@ This guide explains how to integrate Plane with external secret management solut
52
52
```
53
53
54
54
Replace `<IAM-USER-ARN>` with the ARN of the user created in step 1.
55
-
Attach the AWS IAM policy created in step 4 to this role.
56
55
57
-
6. Create secrets in AWS Secrets Manager with your Plane configuration values. For example, store RabbitMQ credentials with a name like `prod/secrets/rabbitmq`.
56
+
6. Attach the AWS IAM policy created in step 4 to the IAM role.
57
+
58
+
7. Create secrets in AWS Secrets Manager with your Plane configuration values. For example, store RabbitMQ credentials with a name like `prod/secrets/rabbitmq`.
58
59
59
60
|Key|Value|
60
61
|-------|--------|
@@ -63,15 +64,15 @@ This guide explains how to integrate Plane with external secret management solut
63
64
64
65
Follow this pattern to manage all the [environment variables](/self-hosting/methods/kubernetes#external-secrets-config) in AWS Secrets Manager.
65
66
66
-
7. Create a Kubernetes secret containing AWS credentials in your application namespace:
67
+
8. Create a Kubernetes secret containing AWS credentials in your application namespace:
0 commit comments