You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
`SecretProviderClass` resource is namespaced. Create a `secret-provider-class-aws.yaml` file in the same directory where the target deployment is located in your GitOps repository.
295
295
296
-
*Example `secret-provider-app.yaml` file*
296
+
*Example `secret-provider-class-aws.yaml` file*
297
297
```
298
298
apiVersion: secrets-store.csi.x-k8s.io/v1
299
299
kind: SecretProviderClass
300
300
metadata:
301
301
name: my-aws-provider
302
-
namespace: dev \\ Has to match the namespace of the resource which is going to use the secret
302
+
namespace: dev # Has to match the namespace of the resource which is going to use the secret
- objectName: "<your-secret-name>"\\ This is the secret name you created in AWS
307
+
- objectName: "<your-secret-name>"
308
308
objectType: "secretsmanager"
309
309
```
310
310
After pushing this YAML file to your GitOps repository, the namespace-scoped `SecretProviderClass` resource will be populated in the target application page in Argo CD UI. You may need to manually **Sync** the `SecretProviderClass` resource if the Sync Policy your application is not set to Auto.
0 commit comments