You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Now you can create a [ClusterSecretStore](https://external-secrets.io/main/api/clustersecretstore/) resource that will tell External Secrets Operator to use Pulumi ESC as a secret provider.
63
+
You can create a [SecretStore](https://external-secrets.io/main/api/secretstore/) resource to notify the External Secrets Operator to use Pulumi ESC as a secret provider for a specific namespace.
61
64
62
-
If you want to limit the access by namespace, you can create a [SecretStore](https://external-secrets.io/main/api/secretstore/) resource instead, which is scoped to a single namespace.
65
+
However, if you want to expand the scope to an entire cluster you can use a [ClusterSecretStore](https://external-secrets.io/main/api/clustersecretstore/) resource instead.
63
66
64
67
```yaml
65
68
cat <<EOF | kubectl apply -f -
66
-
apiVersion: external-secrets.io/v1beta1
67
-
kind: ClusterSecretStore
69
+
apiVersion: external-secrets.io/v1
70
+
kind: SecretStore
68
71
metadata:
69
72
name: secret-store
73
+
namespace: external-secrets
70
74
spec:
71
75
provider:
72
76
pulumi:
73
-
organization: ${PULUMI_ORG}
74
-
project: ${ESC_PROJECT}
75
-
environment: ${ESC_ENV}
77
+
organization: {PULUMI_ORG_NAME}
78
+
project: {ESC_PROJECT_NAME}
79
+
environment: {ESC_ENV_NAME}
76
80
accessToken:
77
81
secretRef:
78
82
name: pulumi-access-token
@@ -81,9 +85,9 @@ spec:
81
85
EOF
82
86
```
83
87
84
-
Please replace `${PULUMI_ORG}`, `${ESC_PROJECT}`, `${ESC_ENV}` with your Pulumi organization, project, and environment names.
88
+
Please replace `${PULUMI_ORG_NAME}`, `${ESC_PROJECT_NAME}`, `${ESC_ENV_NAME}` with your Pulumi organization, project, and environment names.
85
89
86
-
For demo purposes, we assume that we already have an [ESC environment](/docs/esc/get-started/create-environment/)`my-org/my-project/my-env` with a secret `my-secret` that we want to manage using External Secrets Operator.
90
+
For demo purposes, we assume that we already have an [ESC environment](/docs/esc/get-started/create-environment/)`my-org/my-project/my-env` with a secret `my-secret` that we want to manage using the External Secrets Operator.
87
91
88
92
```yaml
89
93
values:
@@ -96,18 +100,19 @@ Now you can create an [ExternalSecret](https://external-secrets.io/main/api/exte
96
100
97
101
```yaml
98
102
cat <<EOF | kubectl apply -f -
99
-
apiVersion: external-secrets.io/v1beta1
103
+
apiVersion: external-secrets.io/v1
100
104
kind: ExternalSecret
101
105
metadata:
102
106
name: secret
107
+
namespace: external-secrets
103
108
spec:
104
109
data:
105
110
- secretKey: esc-secret
106
111
remoteRef:
107
112
key: hello
108
113
refreshInterval: 20s
109
114
secretStoreRef:
110
-
kind: ClusterSecretStore
115
+
kind: SecretStore
111
116
name: secret-store
112
117
EOF
113
118
```
@@ -119,7 +124,7 @@ There a many other options available for [ExternalSecret](https://external-secre
119
124
With the following command, you can verify that the secret has been created in the cluster:
120
125
121
126
```bash
122
-
kubectl get secret secret -o jsonpath='{.data.esc-secret}'| base64 -d
127
+
kubectl get secret secret --namespace external-secrets -o jsonpath='{.data.esc-secret}'| base64 -d
0 commit comments