content large_stringlengths 3 20.5k | url large_stringlengths 54 193 | branch large_stringclasses 4
values | source large_stringclasses 42
values | embeddings listlengths 384 384 | score float64 -0.21 0.65 |
|---|---|---|---|---|---|
# A few common k8s secret types examples Here we will give some examples of how to work with a few common k8s secret types. We will give this examples here with the gcp provider (should work with other providers in the same way). Please also check the guides on [Advanced Templating](templating.md) to understand the det... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/common-k8s-secret-types.md | main | external-secrets | [
-0.0987536758184433,
0.05172717571258545,
0.07325775921344757,
-0.014285164885222912,
-0.03629830852150917,
0.02662549540400505,
0.05219968408346176,
0.01630488783121109,
-0.015369267202913761,
0.04920567199587822,
-0.020886771380901337,
-0.09488516300916672,
0.04372015967965126,
-0.022184... | -0.042859 |
External Secrets Operator provides different modes of operation to fulfill organizational needs. This guide outlines the flexibility of ESO and should give you a first impression of how you can employ this operator in your organization. For a multi-tenant deployment you should first examine your organizational structur... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/multi-tenancy.md | main | external-secrets | [
-0.015743067488074303,
-0.027930613607168198,
-0.010584323666989803,
-0.007584545761346817,
-0.053584024310112,
-0.024380797520279884,
0.023125674575567245,
-0.025270698592066765,
0.05975163355469704,
0.017843279987573624,
-0.01218346506357193,
-0.06576001644134521,
0.05546566843986511,
-0... | 0.136325 |
Contrary to what `ExternalSecret` does by pulling secrets from secret providers and creating `kind=Secret` in your cluster, `PushSecret` reads a local `kind=Secret` and pushes its content to a secret provider. The update behavior of `PushSecret` is controlled by `spec.updatePolicy`. The default policy is `Replace`, suc... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/pushsecrets.md | main | external-secrets | [
-0.0937834158539772,
-0.04664010554552078,
0.013233327306807041,
0.050961971282958984,
0.018891775980591774,
-0.03524467349052429,
0.04044267162680626,
0.005663218442350626,
0.026661165058612823,
0.021625038236379623,
0.06087304651737213,
-0.029401656240224838,
0.021966900676488876,
-0.035... | 0.017562 |
# Guides The following guides demonstrate use-cases and provide examples of how to use the API. Please pick one of the following guides: \* [Multi-Tenancy Design Considerations](multi-tenancy.md) \* [Find multiple secrets & Extract Secret values](getallsecrets.md) \* [Advanced Templating](templating.md) \* [Targeting C... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/introduction.md | main | external-secrets | [
-0.00009131057595368475,
0.033954281359910965,
-0.08692086488008499,
-0.04766193777322769,
0.025578292086720467,
-0.04180567339062691,
-0.04430156573653221,
0.01737564615905285,
-0.018193909898400307,
0.06366671621799469,
0.03388887271285057,
0.0027469350025057793,
0.13164153695106506,
-0.... | 0.001716 |
# Advanced Templating v1 !!! warning Templating Engine v1 is \*\*deprecated\*\* and will be removed in the future. Please migrate to engine v2 and take a look at our [upgrade guide](templating.md#migrating-from-v1) for changes. !!! note Templating Engine v1 does NOT support templating the `spec.target.template.metadata... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/templating-v1.md | main | external-secrets | [
-0.05117591470479965,
0.13296222686767578,
-0.02128717303276062,
0.03125239536166191,
0.007541590835899115,
0.028300510719418526,
0.035563986748456955,
0.049981776624917984,
-0.04918743669986725,
-0.06676949560642242,
0.05044948309659958,
-0.06956613063812256,
-0.02067110501229763,
-0.0025... | 0.041336 |
# Upgrading CRD versions From version v0.5.0, `v1alpha1` version is deprecated, and `v1beta1` is in place. This guide will cover the main differences between the two versions, and a procedure on how to safely upgrade it. ## Differences between versions Versions v1alpha1 and v1beta1 are fully-compatible for SecretStores... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/v1beta1.md | main | external-secrets | [
-0.0961495190858841,
0.004387669265270233,
0.03303522989153862,
-0.00831935741007328,
0.04582257941365242,
-0.010231352411210537,
-0.04281163960695267,
0.008248867467045784,
0.04128387197852135,
0.035465795546770096,
0.05256389454007149,
-0.05802526697516441,
0.022943168878555298,
-0.09388... | 0.053628 |
# Advanced Templating v2 With External Secrets Operator you can transform the data from the external secret provider before it is stored as `Kind=Secret`. You can do this with the `Spec.Target.Template`. Each data value is interpreted as a [Go template](https://golang.org/pkg/text/template/). Please note that referenci... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/templating.md | main | external-secrets | [
-0.04468819499015808,
0.11085355281829834,
-0.0017512253252789378,
0.029823070392012596,
-0.01184196025133133,
0.02340693585574627,
0.052369583398103714,
0.06804549694061279,
0.012817555107176304,
-0.012150873430073261,
0.022198261693120003,
-0.08335881680250168,
0.01846393756568432,
-0.00... | -0.021413 |
a look at this example on how to transform it into the desired format: ```yaml {% include 'jwk-template-v2-external-secret.yaml' %} ``` ### Filter PEM blocks Consider you have a secret that contains both a certificate and a private key encoded in PEM format and it is your goal to use only the certificate from that secr... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/templating.md | main | external-secrets | [
-0.038208991289138794,
0.1300753355026245,
0.0157445278018713,
-0.00921020656824112,
0.03682783246040344,
0.005385029595345259,
0.008208569139242172,
0.013146341778337955,
0.03005961887538433,
-0.022127903997898102,
0.015232634730637074,
-0.09905252605676651,
0.04151405021548271,
-0.006640... | -0.114332 |
feel a function is missing or might be valuable feel free to open an issue and submit a [pull request](../contributing/process.md#submitting-a-pull-request). | Function | Description | | ---------------- | ------------------------------------------------------------------------------------------------------------------... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/templating.md | main | external-secrets | [
-0.09220042079687119,
0.026073133572936058,
0.027912326157093048,
-0.0014610819052904844,
0.04664292559027672,
-0.009589440189301968,
-0.044720057398080826,
0.033961132168769836,
0.03234987333416939,
0.00874327588826418,
-0.013986196368932724,
-0.08545362204313278,
-0.028527643531560898,
-... | 0.028684 |
`toJSON` was renamed to `toJson`. Any errors that occur during marshalling are silenced. - `pkcs12key` and `pkcs12keyPass` encode the PKCS#8 key directly into PEM format. There is no need to call `pemPrivateKey` anymore. Also, these functions do extract all private keys from the PKCS#12 archive not just the first one. ... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/templating.md | main | external-secrets | [
-0.13729172945022583,
0.07683254778385162,
-0.06798906624317169,
-0.07136261463165283,
0.05934031307697296,
-0.01086523849517107,
-0.036637771874666214,
0.01630522310733795,
0.03506099805235863,
0.005243802443146706,
0.04783761873841286,
0.013790291734039783,
0.030141567811369896,
0.030359... | -0.040164 |
You can test a feature that was not yet released using the following methods, use them at your own discretion: ### Helm 1. Create a `values.yaml` file with the following content: ```yaml replicaCount: 1 image: repository: ghcr.io/external-secrets/external-secrets pullPolicy: IfNotPresent # -- The image tag to use. The ... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/using-latest-image.md | main | external-secrets | [
-0.03685936704277992,
0.03472455218434334,
0.050463657826185226,
-0.03630765900015831,
0.048805031925439835,
-0.056963153183460236,
-0.11860793083906174,
0.02718427963554859,
0.034950755536556244,
0.03899887204170227,
0.02535879984498024,
-0.10879666358232498,
0.025560854002833366,
-0.0222... | 0.021945 |
# Using the esoctl tool The tool can be found under `cmd/esoctl`. ## Debugging templates The `template` command can be used to test templates for `PushSecret` and `ExternalSecret`. To run render simply execute `make build` in the `cmd/esoctl` folder. This will result in a binary under `cmd/esoctl/bin`. Once the build s... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/using-esoctl-tool.md | main | external-secrets | [
-0.11002561450004578,
-0.014819213189184666,
0.005214882083237171,
0.01795327290892601,
0.058521393686532974,
-0.060160212218761444,
-0.043161265552043915,
0.0478096641600132,
0.0052874889224767685,
0.005984734743833542,
0.035555336624383926,
-0.11394529044628143,
-0.024008870124816895,
-0... | 0.039354 |
GrafanaSpec \*GrafanaSpec `json:"grafanaSpec,omitempty"` MFASpec \*MFASpec `json:"mfaSpec,omitempty"` + MyAwesomeGeneratorSpec \*MyAwesomeGeneratorSpec `json:"myawesomegeneratorSpec,omitempty"` } // ClusterGenerator represents a cluster-wide generator which can be referenced as part of `generatorRef` fields. diff --git... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/using-esoctl-tool.md | main | external-secrets | [
-0.16615106165409088,
0.03637252748012543,
-0.08366533368825912,
0.016604870557785034,
0.03148878365755081,
-0.039433322846889496,
-0.03262367099523544,
0.005203960929065943,
-0.009096469730138779,
-0.05895347520709038,
0.086549773812294,
-0.07202927768230438,
-0.017822787165641785,
-0.030... | 0.14147 |
# Targeting Custom Resources !!! warning "Maturity" At the time of this writing (1.11.2025) this feature is in heavy alpha status. Please consider the following documentation with the limitations and guardrails described below. External Secrets Operator can create and manage resources beyond Kubernetes Secrets. When yo... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/targeting-custom-resources.md | main | external-secrets | [
-0.01492279302328825,
0.028787866234779358,
0.035351190716028214,
0.00982317328453064,
0.012105297297239304,
0.006830370519310236,
0.08313523977994919,
0.01651371829211712,
0.07243131846189499,
0.022160544991493225,
-0.02686925418674946,
-0.08120685815811157,
0.05984262004494667,
0.0241363... | 0.094883 |
resources using the template metadata: ```yaml {% include 'manifest-labeled-configmap.yaml' %} ``` The operator automatically adds the `externalsecrets.external-secrets.io/managed: "true"` label to track which resources it manages. ## RBAC Requirements When using custom resource targets, ensure the External Secrets Ope... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/targeting-custom-resources.md | main | external-secrets | [
-0.03395914286375046,
-0.02221611887216568,
-0.04626108333468437,
0.022790832445025444,
0.06799434870481491,
-0.019227074459195137,
0.014159864746034145,
0.01046162098646164,
0.019639289006590843,
0.042542532086372375,
0.013049387373030186,
-0.031988296657800674,
0.06363702565431595,
0.028... | 0.092247 |
# Rewriting Keys in DataFrom When calling out an ExternalSecret with `dataFrom.extract` or `dataFrom.find`, it is possible that you end up with a kubernetes secret that has conflicts in the key names, or that you simply want to remove a common path from the secret keys. In order to do so, it is possible to define a set... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/datafrom-rewrite.md | main | external-secrets | [
-0.05582069978117943,
0.06751065701246262,
0.06354149430990219,
-0.004706914070993662,
-0.02888891100883484,
-0.0021781031973659992,
-0.0064198230393230915,
-0.013299594633281231,
0.09988755732774734,
0.04777894169092178,
-0.02368718944489956,
-0.0601404570043087,
0.0013494588201865554,
-0... | 0.055691 |
key collisions The following ExternalSecret: ```yaml {% include 'datafrom-rewrite-conflict.yaml' %} ``` Will allow two secrets with the same JSON keys to be imported into a Kubernetes Secret without any conflict. In this example, if we had the following secrets available in the provider: ```json { "my-secrets-dev": { "... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/datafrom-rewrite.md | main | external-secrets | [
-0.0759800523519516,
0.008679581806063652,
0.07164355367422104,
-0.03402112424373627,
0.0038227990735322237,
-0.0356874018907547,
-0.008656799793243408,
-0.01718919165432453,
0.1065601333975792,
-0.011030670255422592,
0.07238984107971191,
0.0002076178352581337,
0.06641492247581482,
-0.0322... | -0.002929 |
# Deploying without ClusterSecretStore and ClusterExternalSecret and ClusterPushSecret When deploying External Secrets Operator via Helm chart, the default configuration will install `ClusterSecretStore` and `ClusterExternalSecret` and other CRDs and these objects will be processed by the operator. In order to disable ... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/disable-cluster-features.md | main | external-secrets | [
0.019442280754446983,
0.032564856112003326,
-0.016533100977540016,
-0.011170887388288975,
-0.0043472908437252045,
0.007092128042131662,
-0.052902646362781525,
-0.0029823249205946922,
0.009599518030881882,
0.04392059147357941,
0.04228374734520912,
-0.08573656529188156,
0.034748125821352005,
... | 0.028596 |
# Lifecycle The External Secrets Operator manages the lifecycle of secrets in Kubernetes. With `refreshPolicy`, `creationPolicy` and `deletionPolicy` you get fine-grained control of its lifecycle. !!! note "Creation/Deletion Policy Combinations" Some combinations of creationPolicy/deletionPolicy are not allowed as they... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/ownership-deletion-policy.md | main | external-secrets | [
-0.10323890298604965,
-0.038789935410022736,
0.007998289540410042,
0.034368306398391724,
-0.02309594675898552,
-0.008767814375460148,
0.013595635071396828,
-0.05874668061733246,
0.1575581580400467,
0.05457814037799835,
0.03962429240345955,
-0.018775928765535355,
-0.012220178730785847,
-0.0... | 0.108919 |
gets deleted on the provider side and is not accessible anymore this is not considered an error and the ExternalSecret does not go into SecretSyncedError status. | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/ownership-deletion-policy.md | main | external-secrets | [
-0.10841391235589981,
-0.03966769948601723,
-0.009345016442239285,
0.034779373556375504,
0.03590823709964752,
-0.019081033766269684,
-0.006020188797265291,
-0.0010104426182806492,
0.0759778693318367,
-0.01628516986966133,
0.0596928708255291,
0.02247176133096218,
0.016338838264346123,
0.028... | -0.001968 |
# Controller Classes > NOTE: this feature is experimental and not highly tested Controller classes are a property set during the deployment that allows multiple controllers to work in a group of workload. It works by separating which secretStores are going to be attributed to which controller. For the behavior of a sin... | https://github.com/external-secrets/external-secrets/blob/main//docs/guides/controller-class.md | main | external-secrets | [
-0.06891808658838272,
-0.00835566595196724,
-0.07319000363349915,
0.008814138360321522,
-0.004199496004730463,
0.010613062418997288,
-0.019337086006999016,
0.03158828616142273,
0.018945515155792236,
0.035804059356451035,
0.1039736345410347,
0.005192471668124199,
0.02719465270638466,
-0.033... | -0.049336 |
# GitOps using FluxCD (v2) FluxCD is a GitOps operator for Kubernetes. It synchronizes the status of the cluster from manifests allocated in different repositories (Git or Helm). This approach fits perfectly with External Secrets on clusters which are dynamically created, to get credentials with no manual intervention ... | https://github.com/external-secrets/external-secrets/blob/main//docs/examples/gitops-using-fluxcd.md | main | external-secrets | [
-0.10338130593299866,
-0.0016231279587373137,
0.015734359622001648,
-0.012828071601688862,
-0.01887749508023262,
-0.016463421285152435,
0.03313407674431801,
0.03823968395590782,
0.09692852199077606,
0.07324283570051193,
-0.03332572430372238,
-0.07186610996723175,
0.07930687069892883,
-0.03... | 0.246485 |
the CRDs As mentioned, CRDs can be deployed using the official Helm package, but to solve the race condition, they will be deployed from our git repository using a Kustomization manifest called `deployment-crds.yaml` as follows: ```yaml {% include 'gitops/deployment-crds.yaml' %} ``` ## Deploy the operator The operator... | https://github.com/external-secrets/external-secrets/blob/main//docs/examples/gitops-using-fluxcd.md | main | external-secrets | [
-0.01650422066450119,
0.003662011818960309,
0.015796344727277756,
-0.10072272270917892,
-0.003900666953995824,
-0.015397122129797935,
-0.02658027596771717,
0.004133619833737612,
-0.00879777129739523,
0.025509459897875786,
0.03940870985388756,
-0.05780963972210884,
0.026063309982419014,
-0.... | 0.042931 |
# Bitwarden support using webhook provider Bitwarden is an integrated open source password management solution for individuals, teams, and business organizations. !!! note This documentation is for Bitwarden \*\*Password Manager\*\*. It is different from [Bitwarden Secrets Manager](https://bitwarden.com/products/secret... | https://github.com/external-secrets/external-secrets/blob/main//docs/examples/bitwarden.md | main | external-secrets | [
-0.11878269910812378,
-0.021242793649435043,
-0.08167585730552673,
-0.004855410195887089,
-0.02029346115887165,
-0.04624081403017044,
-0.012000108137726784,
-0.022515572607517242,
-0.01292773149907589,
-0.004443629179149866,
0.02198396436870098,
-0.03786301240324974,
0.0793280154466629,
-0... | 0.098724 |
# Getting started Jenkins is one of the most popular automation servers for continuous integration, automation, scheduling jobs and for generic pipelining. It has an extensive set of plugins that extend or provide additional functionality including the [kubernetes credentials plugin](https://github.com/jenkinsci/kubern... | https://github.com/external-secrets/external-secrets/blob/main//docs/examples/jenkins-kubernetes-credentials.md | main | external-secrets | [
-0.09600162506103516,
0.0088399238884449,
-0.03862336277961731,
0.00283878855407238,
-0.061161063611507416,
-0.010111343115568161,
-0.01859411969780922,
0.006311197765171528,
0.08240161091089249,
0.012483594007790089,
-0.050676602870225906,
-0.040607478469610214,
0.04445735365152359,
-0.00... | 0.176633 |
# Getting started \*\*Anchore Engine\*\* is an open-source platform that provides centralized inspection, analysis, and certification of container images. When integrated with Kubernetes, it adds powerful features—such as preventing unscanned images from being deployed into your clusters. ## Installation with Helm Ther... | https://github.com/external-secrets/external-secrets/blob/main//docs/examples/anchore-engine-credentials.md | main | external-secrets | [
0.013270695693790913,
0.024704722687602043,
-0.026935985311865807,
-0.00665806932374835,
0.02026652917265892,
-0.020822737365961075,
0.0067910607904195786,
-0.005450442899018526,
0.07631642371416092,
0.033382244408130646,
-0.022134961560368538,
-0.06583283841609955,
0.07414171099662781,
-0... | 0.02651 |
 The `PushSecret` is namespaced and it describes what data should be pushed to the secret provider. \* tells the operator what secrets should be pushed by using `spec.selector`. \* you can specify what secret keys should be pushed by using `spec.data`. \* you can ... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/pushsecret.md | main | external-secrets | [
-0.05456775799393654,
0.019606439396739006,
-0.0019772136583924294,
0.03914736583828926,
0.0001737513521220535,
0.011826165951788425,
0.016943365335464478,
0.08740609139204025,
-0.005072600208222866,
-0.01426331140100956,
0.06883794069290161,
-0.045001499354839325,
0.0005346522084437311,
0... | 0.049565 |
 The `ClusterExternalSecret` is a cluster scoped resource that can be used to manage `ExternalSecret` resources in specific namespaces. With `namespaceSelectors` you can select namespaces in which the ExternalSecret should be created. If there i... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/clusterexternalsecret.md | main | external-secrets | [
-0.060257963836193085,
-0.10453102737665176,
-0.004809287376701832,
0.05980167165398598,
0.05393882468342781,
-0.022558441385626793,
-0.020388852804899216,
-0.030972614884376526,
0.08266060054302216,
-0.013055666349828243,
0.07025023549795151,
-0.08104371279478073,
0.035733576864004135,
-0... | 0.153992 |
The `ExternalSecret` describes what data should be fetched, how the data should be transformed and saved as a `Kind=Secret`: \* tells the operator what secrets should be synced by using `spec.data` to explicitly sync individual keys or use `spec.dataFrom` to get \*\*all values\*\* from the external API. \* you can spec... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/externalsecret.md | main | external-secrets | [
-0.1007113829255104,
0.02780723199248314,
-0.06186514347791672,
0.03801574558019638,
-0.007913971319794655,
0.003589602652937174,
0.026868578046560287,
0.0851307064294815,
-0.0217849500477314,
-0.029173927381634712,
0.05990337207913399,
-0.060562875121831894,
0.0005295035080052912,
0.01257... | 0.070791 |
The `ClusterPushSecret` is a cluster scoped resource that can be used to manage `PushSecret` resources in specific namespaces. With `namespaceSelectors` you can select namespaces in which the PushSecret should be created. If there is a conflict with an existing resource the controller will error out. ## Example Below i... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/clusterpushsecret.md | main | external-secrets | [
-0.06612295657396317,
-0.09286241233348846,
-0.04707647114992142,
0.05850396305322647,
0.01667727343738079,
0.02888067252933979,
-0.02833518385887146,
-0.00040663083200342953,
0.014007319696247578,
0.015851985663175583,
0.07699023932218552,
-0.09817799925804138,
0.034671202301979065,
0.004... | 0.090568 |
# Components ## Overview External Secrets comes with three components: `Core Controller`, `Webhook` and `Cert Controller`. This is due to the need to implement conversion webhooks in order to convert custom resources between api versions and to provide a ValidatingWebhook for the `ExternalSecret` and `SecretStore` reso... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/components.md | main | external-secrets | [
-0.11011573672294617,
0.08337543159723282,
-0.06075255945324898,
0.008451523259282112,
0.05834077671170235,
-0.025007149204611778,
-0.03658874332904816,
0.04934968799352646,
0.083292156457901,
-0.029574479907751083,
0.062261030077934265,
-0.07456963509321213,
0.09185701608657837,
0.0021636... | -0.001052 |
# Controller Options The external-secrets binary includes three components: `core controller`, `certcontroller` and `webhook`. ## Core Controller Flags The core controller is invoked without a subcommand and can be configured with the following flags: | Name | Type | Default | Description | |---------------------------... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/controller-options.md | main | external-secrets | [
-0.07232919335365295,
-0.011883536353707314,
-0.13840189576148987,
-0.00752749340608716,
0.021179962903261185,
-0.03592437133193016,
-0.03788599744439125,
0.037977464497089386,
0.0308176688849926,
0.015317199751734734,
0.060944005846977234,
-0.09437654167413712,
-0.00821455754339695,
-0.06... | 0.046796 |
`--help` | | | help for certcontroller | | `--loglevel` | string | info | loglevel to use, one of: debug, info, warn, error, dpanic, panic, fatal | | `--zap-time-encoding` | string | epoch | time encoding to use, one of: epoch, millis, nano, iso8601, rfc3339, rfc3339nano | | `--metrics-addr` | string | :8080 | The addr... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/controller-options.md | main | external-secrets | [
-0.059017445892095566,
-0.0071967169642448425,
-0.1279495358467102,
-0.03168480470776558,
-0.030619848519563675,
-0.0060133119113743305,
0.004395004827529192,
0.03169571980834007,
0.008027427829802036,
-0.0018660200294107199,
0.06116867437958717,
-0.137618750333786,
0.04071459919214249,
0.... | 0.097219 |
# ExternalSecret Selectable Fields As of Kubernetes 1.30, External Secrets Operator supports selectable fields for querying ExternalSecret resources based on spec field values. This feature enables efficient server-side filtering of ExternalSecret resources. ## Overview Selectable fields allow you to use `kubectl` fiel... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/selectable-fields.md | main | external-secrets | [
-0.0049658529460430145,
0.015564064495265484,
-0.013898734003305435,
0.026052948087453842,
0.06652479618787766,
-0.0255307424813509,
0.06304943561553955,
-0.0004877523169852793,
0.1125289797782898,
-0.0007480316562578082,
-0.02417207509279251,
-0.10118796676397324,
-0.022912828251719475,
-... | 0.127179 |
 The `SecretStore` is namespaced and specifies how to access the external API. The SecretStore maps to exactly one instance of an external API. By design, SecretStores are bound to a namespace and can not reference resources across namespaces. If you want to ... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/secretstore.md | main | external-secrets | [
-0.08747157454490662,
-0.022486012428998947,
-0.0866730585694313,
0.041129108518362045,
0.018987711519002914,
-0.01986038126051426,
-0.052558016031980515,
0.004452737048268318,
-0.005166463553905487,
-0.0036339955404400826,
0.06321598589420319,
-0.017155427485704422,
0.03378059342503548,
-... | 0.09282 |
# Metrics The External Secrets Operator exposes its Prometheus metrics in the `/metrics` path. To enable it, set the `serviceMonitor.enabled` Helm flag to `true`. If you are using a different monitoring tool that also needs a `/metrics` endpoint, you can set the `metrics.service.enabled` Helm flag to `true`. In additio... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/metrics.md | main | external-secrets | [
-0.058781858533620834,
-0.04011043906211853,
-0.06854193657636642,
0.02679385617375374,
-0.02716592699289322,
-0.04134722426533699,
-0.028793243691325188,
0.008815429173409939,
0.09267137199640274,
-0.017063409090042114,
0.005176906008273363,
-0.1516999751329422,
0.0059278616681694984,
-0.... | 0.099008 |
able to reconcile resources in time. I.e. delivery of secret updates is delayed. Note: when a controller is restarted, then `queue length = total number of resources`. Make sure to measure the time it takes for the controller to fully reconcile all secrets after a restart. In large clusters this may take a while, make ... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/metrics.md | main | external-secrets | [
-0.09909410774707794,
-0.05130169913172722,
-0.04190696030855179,
0.0717601552605629,
0.04029322788119316,
-0.08515562117099762,
0.0017939828103408217,
-0.04123544692993164,
0.06617481261491776,
0.010242006741464138,
0.04533195495605469,
0.04424954205751419,
-0.012506349943578243,
-0.03600... | 0.055542 |
Packages: * [external-secrets.io/v1](#external-secrets.io%2fv1) * [external-secrets.io/v1alpha1](#external-secrets.io%2fv1alpha1) * [external-secrets.io/v1beta1](#external-secrets.io%2fv1beta1) * [generators.external-secrets.io/v1alpha1](#generators.external-secrets.io%2fv1alpha1) ## external-secrets.io/v1 Package v1 c... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.1619214117527008,
-0.003402082249522209,
-0.0736924335360527,
-0.006336917635053396,
0.08001778274774551,
-0.003788510337471962,
0.010568471625447273,
0.025654355064034462,
0.06676347553730011,
0.008093073032796383,
-0.002922129351645708,
-0.06810076534748077,
0.026802506297826767,
-0.0... | 0.080926 |
| `accessID` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#SecretKeySelector)* | The SecretAccessID is used for authentication | | `accessType` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/extern... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.08954057842493057,
0.04864443838596344,
-0.07131615281105042,
0.025473108515143394,
0.010896893218159676,
0.01647925190627575,
0.044367771595716476,
-0.014439304359257221,
0.039652567356824875,
-0.021042734384536743,
0.05223468691110611,
0.00815493892878294,
-0.017778247594833374,
0.007... | 0.07414 |
*string* | region is for configuring the AWS region to be used. | | `awsCredentialsSecretRef` *[SecretReference](#external-secrets.io/v1.SecretReference)* | awsCredentialsSecretRef is the reference to the secret which holds the AWS credentials. Secret should be created with below names for keys - aws\_access\_key\_id: ... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.05259763449430466,
0.07302773743867874,
-0.06447169929742813,
0.007000852841883898,
0.018349602818489075,
0.010479831136763096,
0.10208448767662048,
-0.010963743552565575,
0.08735117316246033,
0.102470263838768,
-0.017109913751482964,
-0.06683750450611115,
0.09399046003818512,
-0.026839... | 0.098579 |
service principal (tenantId, clientId, clientSecret) - “ManagedIdentity”: Using Managed Identity assigned to the pod (see aad-pod-identity) | | `vaultUrl` *string* | Vault Url from which the secrets to be fetched from. | | `tenantId` *string* | *(Optional)* TenantID configures the Azure Tenant to send requests to. Requ... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.00048222840996459126,
0.0072554899379611015,
-0.05135764554142952,
0.004387585446238518,
-0.0536661371588707,
0.016982318833470345,
0.02999584935605526,
-0.064602330327034,
0.10852177441120148,
0.08058125525712967,
0.03136332705616951,
-0.027806749567389488,
0.01782863214612007,
0.05779... | 0.054694 |
required. | | `clientId` *[BeyondTrustProviderSecretRef](#external-secrets.io/v1.BeyondTrustProviderSecretRef)* | ClientID is the API OAuth Client ID. | | `clientSecret` *[BeyondTrustProviderSecretRef](#external-secrets.io/v1.BeyondTrustProviderSecretRef)* | ClientSecret is the API OAuth Client Secret. | | `certificate... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.12087608128786087,
0.07726150006055832,
-0.0396122932434082,
0.007027327083051205,
0.10322992503643036,
-0.044017452746629715,
0.027498463168740273,
0.045750513672828674,
0.04452233016490936,
-0.09430131316184998,
0.043649669736623764,
-0.042035408318042755,
0.10609064996242523,
0.01977... | -0.010439 |
contains a PEM-encoded certificate. | Field | Description | | --- | --- | | `type` *[CAProviderType](#external-secrets.io/v1.CAProviderType)* | The type of provider to use such as “Secret”, or “ConfigMap”. | | `name` *string* | The name of the object located at the provider type. | | `key` *string* | The key where the ... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.03590930998325348,
0.013856316916644573,
-0.028632286936044693,
0.046349674463272095,
0.044450946152210236,
-0.03097333014011383,
0.07626230269670486,
0.03673243150115013,
0.038443394005298615,
-0.02629930153489113,
0.04815826565027237,
-0.13315807282924652,
0.11162674427032471,
-0.0088... | 0.088469 |
`metadata` *[Kubernetes meta/v1.ObjectMeta](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.25/#objectmeta-v1-meta)* | Refer to the Kubernetes API documentation for the fields of the `metadata` field. | | `spec` *[ClusterExternalSecretSpec](#external-secrets.io/v1.ClusterExternalSecretSpec)* | | `exter... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.038103628903627396,
-0.030854349955916405,
-0.03372679650783539,
0.012348423711955547,
0.01641882210969925,
-0.0004846010124310851,
0.011815523728728294,
0.04175858199596405,
0.08530370146036148,
0.04267673194408417,
0.0064116124995052814,
-0.12599234282970428,
-0.005738083738833666,
-0... | 0.165901 |
| | `status` *[Kubernetes core/v1.ConditionStatus](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.25/#conditionstatus-v1-core)* | | | `message` *string* | *(Optional)* | ### ClusterSecretStore ClusterSecretStore represents a secure external location for storing secrets, which can be referenced as part... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.010876642540097237,
0.03429099917411804,
-0.07759604603052139,
0.042468782514333725,
0.016738945618271828,
0.03302573040127754,
-0.0067464387975633144,
0.011267311871051788,
0.07106801867485046,
0.07384193688631058,
0.023658540099859238,
-0.09679335355758667,
0.02032807096838951,
-0.039... | 0.182392 |
in a Secret resource containing JWT token to authenticate with Conjur using the JWT authentication method. | | `serviceAccountRef` *[External Secrets meta/v1.ServiceAccountSelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#ServiceAccountSelector)* | *(Optional)* Optional ServiceAccou... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.11138158291578293,
0.030644025653600693,
0.051361460238695145,
-0.05395825207233429,
-0.05911249294877052,
-0.02857128530740738,
0.0543639175593853,
0.020948775112628937,
0.12211734801530838,
-0.009412456303834915,
-0.0006203243974596262,
-0.047049883753061295,
0.041790712624788284,
-0.... | 0.117873 |
| | `host` *string* | URL configures the Device42 instance URL. | | `auth` *[Device42Auth](#external-secrets.io/v1.Device42Auth)* | Auth configures how secret-manager authenticates with a Device42 instance. | ### Device42SecretRef (*Appears on:* [Device42Auth](#external-secrets.io/v1.Device42Auth)) Device42SecretRef co... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.06908850371837616,
0.024135665968060493,
-0.011266004294157028,
-0.03859477862715721,
0.04082735627889633,
-0.060737453401088715,
0.0020460968371480703,
0.033309560269117355,
0.022414278239011765,
0.01920551247894764,
0.05786643922328949,
-0.015122460201382637,
0.07054485380649567,
0.01... | 0.026469 |
“µs”), “ms”, “s”, “m”, “h” Example values: “1h0m0s”, “2h30m0s”, “10m0s” May be set to “0s” to fetch and create it once. Defaults to 1h0m0s. | | `data` *[[]ExternalSecretData](#external-secrets.io/v1.ExternalSecretData)* | *(Optional)* Data defines the connection between the Kubernetes Secret keys and the Provider data ... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.032366879284381866,
-0.004894607234746218,
0.00024231306451838464,
0.0044933222234249115,
-0.015167448669672012,
-0.019732298329472542,
0.026599708944559097,
0.008045806549489498,
0.0906849279999733,
0.039839088916778564,
0.05833185836672783,
-0.08441667258739471,
0.047273170202970505,
... | 0.098836 |
| | --- | --- | | `key` *string* | Key is the key used in the Provider, mandatory | | `metadataPolicy` *[ExternalSecretMetadataPolicy](#external-secrets.io/v1.ExternalSecretMetadataPolicy)* | *(Optional)* Policy for fetching tags/labels from provider secrets, possible options are Fetch, None. Defaults to None | | `prop... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.05341070517897606,
0.006919356063008308,
-0.062474243342876434,
-0.022178472951054573,
0.08678391575813293,
-0.020990168675780296,
0.04701054096221924,
0.03420804440975189,
-0.027306942269206047,
-0.033417027443647385,
0.07292340695858002,
-0.06337657570838928,
0.035580795258283615,
-0.... | 0.027228 |
the ExternalSecret’s metadata or spec changes. | | "Periodic" | RefreshPolicyPeriodic synchronizes the Secret from the provider at regular intervals. | ### ExternalSecretRewrite (*Appears on:* [ExternalSecretDataFromRemoteRef](#external-secrets.io/v1.ExternalSecretDataFromRemoteRef)) ExternalSecretRewrite defines how t... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.10678242146968842,
-0.017354076728224754,
0.030709106475114822,
0.033399924635887146,
0.03231586515903473,
-0.03399255499243736,
0.011300208978354931,
0.026265429332852364,
0.041071273386478424,
0.004964275751262903,
0.04744324833154678,
-0.00988063309341669,
0.03938755765557289,
-0.059... | 0.056836 |
from the external source at regular intervals specified by refreshInterval. No periodic updates occur if refreshInterval is 0. - OnChange: Only synchronizes the Secret when the ExternalSecret’s metadata or specification changes | | `refreshInterval` *[Kubernetes meta/v1.Duration](https://pkg.go.dev/k8s.io/apimachinery/... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.027664095163345337,
-0.01511349342763424,
0.033539336174726486,
0.001796357100829482,
-0.024664876982569695,
-0.024445662274956703,
-0.028170496225357056,
0.02018456533551216,
0.11943662166595459,
0.00626040156930685,
0.04365602508187294,
-0.057836901396512985,
-0.019317271187901497,
-0... | 0.06817 |
| Field | Description | | --- | --- | | `annotations` *map[string]string* | *(Optional)* | | `labels` *map[string]string* | *(Optional)* | | `finalizers` *[]string* | *(Optional)* | ### ExternalSecretValidator ExternalSecretValidator implements a validating webhook for ExternalSecrets. ### FakeProvider (*Appears on:* [... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.14265279471874237,
0.05721556022763252,
-0.04428716376423836,
0.027015559375286102,
0.05893520638346672,
-0.0519494004547596,
0.020386189222335815,
0.010902871377766132,
-0.010410708375275135,
-0.04226023703813553,
0.05320362374186516,
-0.09841612726449966,
0.042323701083660126,
0.01566... | 0.071769 |
is the name of the cluster If not specified, it fetches information from the metadata server | | `clusterProjectID` *string* | *(Optional)* ClusterProjectID is the project ID of the cluster If not specified, it fetches information from the metadata server | ### GCPWorkloadIdentityFederation (*Appears on:* [GCPSMAuth](#... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.05415955185890198,
-0.02266688458621502,
0.003919878508895636,
0.027125073596835136,
-0.012517440132796764,
0.016591981053352356,
0.040914472192525864,
0.013632806949317455,
0.03607857972383499,
0.017160644754767418,
-0.022682897746562958,
-0.097289077937603,
0.0737190693616867,
-0.0352... | 0.139867 |
the Github APP that will be used to authenticate the client | | `installationID` *int64* | installationID specifies the Github APP installation that will be used to authenticate the client | | `organization` *string* | organization will be used to fetch secrets from the Github organization | | `repository` *string* | *... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.11550290137529373,
-0.009852009825408459,
-0.028241831809282303,
0.011121504008769989,
-0.021187130361795425,
-0.08551032096147537,
-0.024502549320459366,
-0.0028532722499221563,
0.06965769827365875,
-0.007333911489695311,
0.011978307738900185,
-0.0027342308312654495,
0.12643344700336456,... | 0.02289 |
`azureAuthCredentials` *[AzureAuthCredentials](#external-secrets.io/v1.AzureAuthCredentials)* | *(Optional)* | | `gcpIdTokenAuthCredentials` *[GcpIDTokenAuthCredentials](#external-secrets.io/v1.GcpIDTokenAuthCredentials)* | *(Optional)* | | `gcpIamAuthCredentials` *[GcpIamAuthCredentials](#external-secrets.io/v1.GcpIam... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.10150701552629471,
-0.012731960043311119,
0.023073453456163406,
-0.021701563149690628,
-0.007415929809212685,
0.008264753036201,
0.06200966611504555,
-0.04363057762384415,
0.03466000035405159,
0.045122891664505005,
0.03947341442108154,
-0.07018622010946274,
0.05392450466752052,
0.013754... | 0.000434 |
| `caProvider` *[CAProvider](#external-secrets.io/v1.CAProvider)* | *(Optional)* see: <https://external-secrets.io/v0.4.1/spec/#external-secrets.io/v1alpha1.CAProvider> | ### LdapAuthCredentials (*Appears on:* [InfisicalAuth](#external-secrets.io/v1.InfisicalAuth)) LdapAuthCredentials represents the credentials for LDA... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.08244950324296951,
-0.04445144161581993,
-0.055748503655195236,
-0.02181784063577652,
0.04488792270421982,
-0.009026284329593182,
0.05103687942028046,
0.060314957052469254,
-0.023306410759687424,
-0.00818482507020235,
0.0634874552488327,
-0.061470698565244675,
0.008082368411123753,
-0.0... | 0.043021 |
just return without doing anything. ### OciAuthCredentials (*Appears on:* [InfisicalAuth](#external-secrets.io/v1.InfisicalAuth)) OciAuthCredentials represents the credentials for OCI authentication. | Field | Description | | --- | --- | | `identityId` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/gi... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.08917035907506943,
0.03145225718617439,
-0.06095114350318909,
0.014580508694052696,
0.026774641126394272,
-0.04287969693541527,
0.022589994594454765,
0.02126510813832283,
0.04651927202939987,
-0.07121589034795761,
0.06492885202169418,
-0.03274506330490112,
-0.00038898768252693117,
0.012... | -0.002176 |
caching for read operations (GetSecret, GetSecretMap). When enabled, secrets are cached with the specified TTL. Write operations (PushSecret, DeleteSecret) automatically invalidate relevant cache entries. If omitted, caching is disabled (default). cache: {} is a valid option to set. | ### OracleAuth (*Appears on:* [Ora... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.061157044023275375,
0.0077582127414643764,
-0.06925482302904129,
-0.03611324727535248,
-0.037085339426994324,
-0.07931419461965561,
0.05533459782600403,
0.04243997484445572,
0.04144241288304329,
-0.022360598668456078,
0.03221096470952034,
-0.011613672599196434,
0.017675574868917465,
-0.... | 0.015657 |
Password Depot instance URL. | | `database` *string* | Database to use as source | | `auth` *[PasswordDepotAuth](#external-secrets.io/v1.PasswordDepotAuth)* | Auth configures how secret-manager authenticates with a Password Depot instance. | ### PasswordDepotSecretRef (*Appears on:* [PasswordDepotAuth](#external-secret... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.13018546998500824,
-0.027370082214474678,
-0.08557840436697006,
0.006201499607414007,
0.0038125694263726473,
0.06532331556081772,
0.0008612095261923969,
0.050795868039131165,
-0.0025704549625515938,
-0.011197163723409176,
0.005300457589328289,
-0.03566761314868927,
0.08709829300642014,
... | -0.009985 |
references a key in a secret that will be used as value. | ### SecretReference (*Appears on:* [AwsCredentialsConfig](#external-secrets.io/v1.AwsCredentialsConfig)) SecretReference holds the details of a secret. | Field | Description | | --- | --- | | `name` *string* | name of the secret. | | `namespace` *string* | name... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.15153338015079498,
0.03678135946393013,
-0.08687468618154526,
0.03178847208619118,
0.03841210901737213,
0.013660754077136517,
0.08014095574617386,
0.039523787796497345,
0.07506238669157028,
0.020975720137357712,
0.009598223492503166,
-0.05127764865756035,
0.0571366623044014,
-0.00250140... | 0.087411 |
configuration. | Field | Description | | --- | --- | | `aws` *[AWSProvider](#external-secrets.io/v1.AWSProvider)* | *(Optional)* AWS configures this store to sync secrets using AWS Secret Manager provider | | `azurekv` *[AzureKVProvider](#external-secrets.io/v1.AzureKVProvider)* | *(Optional)* AzureKV configures this s... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.09592956304550171,
-0.0003299076633993536,
-0.07657922804355621,
0.046692490577697754,
-0.005305047146975994,
0.027234097942709923,
-0.012566029094159603,
-0.05938824266195297,
0.07329096645116806,
0.0836612805724144,
0.0651453286409378,
-0.003633210202679038,
0.08133042603731155,
-0.05... | -0.052665 |
`device42` *[Device42Provider](#external-secrets.io/v1.Device42Provider)* | *(Optional)* Device42 configures this store to sync secrets using the Device42 provider | | `dvls` *[DVLSProvider](#external-secrets.io/v1.DVLSProvider)* | *(Optional)* DVLS configures this store to sync secrets using Devolutions Server provide... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.11377424746751785,
-0.015984365716576576,
-0.026409436017274857,
-0.02716006711125374,
0.049836013466119766,
-0.036940403282642365,
-0.026305202394723892,
-0.011556924320757389,
0.015624606050550938,
0.037870630621910095,
0.07733145356178284,
-0.003724905429407954,
0.07462359219789505,
... | -0.012466 |
apply to PushSecret (and only when deletionPolicy is set to Delete). | Field | Description | | --- | --- | | `forceDeleteWithoutRecovery` *bool* | *(Optional)* Specifies whether to delete the secret without any recovery window. You can’t use both this parameter and RecoveryWindowInDays in the same call. If you don’t us... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.062299005687236786,
0.00027386084548197687,
-0.006328228395432234,
0.062179092317819595,
0.03774956613779068,
0.03036760538816452,
-0.03585956618189812,
-0.05699572712182999,
0.09742337465286255,
0.04636938124895096,
0.03821289539337158,
-0.01696045510470867,
0.017222829163074493,
-0.02... | -0.040482 |
set), this supports nested paths like “spec.database.config” or “data”. | | `literal` *string* | *(Optional)* | ### TemplateMergePolicy (`string` alias) (*Appears on:* [ExternalSecretTemplate](#external-secrets.io/v1.ExternalSecretTemplate)) TemplateMergePolicy defines how the rendered template should be merged with th... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.061813950538635254,
0.00870407186448574,
-0.03109966404736042,
0.05093841627240181,
0.044707633554935455,
-0.0033767877612262964,
0.03127240389585495,
0.0862681120634079,
-0.03838454931974411,
-0.020409196615219116,
0.009518510662019253,
-0.05430044233798981,
0.05976872146129608,
-0.025... | 0.044964 |
of `tokenSecretRef`, `appRole`, `kubernetes`, `ldap`, `userPass`, `jwt`, `cert`, `iam` or `gcp` can be specified. A namespace to authenticate against can optionally be specified. | Field | Description | | --- | --- | | `namespace` *string* | *(Optional)* Name of the vault namespace to authenticate to. This can be diffe... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.020410718396306038,
-0.03681649640202522,
-0.03133835271000862,
-0.031552914530038834,
-0.039469797164201736,
-0.041876327246427536,
0.001680476008914411,
0.005049560219049454,
0.1052706316113472,
-0.013994788751006126,
-0.0064537362195551395,
-0.068311907351017,
0.07692547142505646,
0.... | 0.059926 |
*(Optional)* SecretRef to a key in a Secret resource containing client private key to authenticate with Vault using the Cert authentication method | ### VaultCheckAndSet (*Appears on:* [VaultProvider](#external-secrets.io/v1.VaultProvider)) VaultCheckAndSet defines the Check-And-Set (CAS) settings for Vault KV v2 PushS... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.05539953336119652,
0.0455639511346817,
-0.04880789667367935,
0.022244330495595932,
-0.00678495317697525,
-0.06154217943549156,
-0.025766611099243164,
0.022314826026558876,
0.08320499211549759,
-0.029698114842176437,
0.045967284590005875,
-0.03655128553509712,
0.07527517527341843,
0.0382... | -0.050865 |
*[VaultAwsJWTAuth](#external-secrets.io/v1.VaultAwsJWTAuth)* | *(Optional)* Specify a service account with IRSA enabled | ### VaultJwtAuth (*Appears on:* [VaultAuth](#external-secrets.io/v1.VaultAuth)) VaultJwtAuth authenticates with Vault using the JWT/OIDC authentication method, with the role name and a token stored ... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.06867007911205292,
0.021500885486602783,
-0.03514629229903221,
-0.02902338281273842,
-0.020656049251556396,
-0.037684015929698944,
-0.00602197227999568,
0.028267715126276016,
0.07661812752485275,
-0.05609208345413208,
-0.01701301336288452,
-0.020283181220293045,
0.016573768109083176,
-0... | 0.061917 |
LDAP Vault authentication method | | `secretRef` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#SecretKeySelector)* | *(Optional)* SecretRef to a key in a Secret resource containing password for the LDAP user used to authenticate with Vault usi... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.03832278400659561,
0.0036248706746846437,
-0.11764112859964371,
-0.03596799448132515,
-0.006004685536026955,
-0.013127879239618778,
-0.01688866689801216,
0.04911414906382561,
0.0001978963118745014,
-0.04879867285490036,
0.07715348154306412,
-0.018712786957621574,
0.03227338567376137,
-0... | -0.066281 |
| ### VolcengineAuth (*Appears on:* [VolcengineProvider](#external-secrets.io/v1.VolcengineProvider)) VolcengineAuth defines the authentication method for the Volcengine provider. Only one of the fields should be set. | Field | Description | | --- | --- | | `secretRef` *[VolcengineAuthSecretRef](#external-secrets.io/v1... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.1431988775730133,
0.014834515750408173,
-0.08901795744895935,
-0.019247138872742653,
-0.0183025561273098,
-0.006835650652647018,
0.021182119846343994,
0.04518110677599907,
-0.004314227029681206,
-0.016421722248196602,
0.02766125649213791,
-0.05195044353604317,
0.004032989032566547,
0.01... | 0.039278 |
from the webhook response. | Field | Description | | --- | --- | | `jsonPath` *string* | *(Optional)* Json path of return value | ### WebhookSecret (*Appears on:* [WebhookProvider](#external-secrets.io/v1.WebhookProvider)) WebhookSecret defines a secret that will be passed to the webhook request. | Field | Description ... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.15829278528690338,
0.09492944926023483,
-0.08011692017316818,
0.024155456572771072,
0.03536712005734444,
-0.04054562747478485,
-0.0066649722866714,
0.003581382567062974,
0.045019540935754776,
-0.019962159916758537,
0.03096632845699787,
-0.1048813983798027,
0.019025925546884537,
-0.03855... | 0.095771 |
by name | ### ClusterPushSecretNamespaceFailure (*Appears on:* [ClusterPushSecretStatus](#external-secrets.io/v1alpha1.ClusterPushSecretStatus)) ClusterPushSecretNamespaceFailure represents a failed namespace deployment and it’s reason. | Field | Description | | --- | --- | | `namespace` *string* | Namespace is the nam... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.05731118842959404,
-0.12279193848371506,
0.007004527375102043,
0.019372791051864624,
-0.0022971697617322206,
-0.020744197070598602,
0.008196576498448849,
0.0021776931826025248,
-0.008216659538447857,
0.01862514019012451,
0.06294482946395874,
-0.14148667454719543,
0.026317918673157692,
0... | 0.105011 |
The structure of metadata is provider specific, please look it up in the provider documentation. | | `conversionStrategy` *[PushSecretConversionStrategy](#external-secrets.io/v1alpha1.PushSecretConversionStrategy)* | *(Optional)* Used to define a conversion Strategy for the secret keys | ### PushSecretDeletionPolicy (`... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.06928125768899918,
-0.036075323820114136,
-0.074940524995327,
-0.00007189880852820352,
0.0344742089509964,
-0.042050108313560486,
0.016481909900903702,
-0.01380284782499075,
0.040294814854860306,
-0.010153776034712791,
0.052911099046468735,
-0.03960559889674187,
0.07817978411912918,
-0.... | -0.000503 |
| *(Optional)* | ### PushSecretStatusCondition (*Appears on:* [ClusterPushSecretStatus](#external-secrets.io/v1alpha1.ClusterPushSecretStatus), [PushSecretStatus](#external-secrets.io/v1alpha1.PushSecretStatus)) PushSecretStatusCondition indicates the status of the PushSecret. | Field | Description | | --- | --- | | `t... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.03501099720597267,
-0.03949348255991936,
0.014237136580049992,
0.009456481784582138,
0.01993998885154724,
-0.006421377416700125,
-0.007034830283373594,
0.021452615037560463,
0.041399721056222916,
0.02741902694106102,
0.02330174297094345,
-0.10582058131694794,
-0.013201279565691948,
-0.0... | 0.19221 |
role session tags | | `secretsManager` *[SecretsManager](#external-secrets.io/v1beta1.SecretsManager)* | *(Optional)* SecretsManager defines how the provider behaves when interacting with AWS SecretsManager | | `transitiveTagKeys` *[]\*string* | *(Optional)* AWS STS assume role transitive session tags. Required when mu... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.08040222525596619,
0.008770388551056385,
-0.06312895566225052,
0.0021188147366046906,
0.026982568204402924,
-0.010495947673916817,
0.08847242593765259,
-0.009287206456065178,
0.021718287840485573,
-0.007823748514056206,
0.028791168704628944,
-0.05727391690015793,
0.09734105318784714,
-0... | 0.093246 |
Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#SecretKeySelector)* | The AccessKeyID is used for authentication | | `accessKeySecretSecretRef` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/ap... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.11498851329088211,
0.0018159719184041023,
-0.12065906077623367,
0.017147691920399666,
-0.012217937968671322,
0.028785405680537224,
0.03179822862148285,
0.023339329287409782,
0.0528256818652153,
-0.02767024375498295,
0.07072237133979797,
-0.0007889684056863189,
0.012719100341200829,
-0.0... | 0.038465 |
| `environmentType` *[AzureEnvironmentType](#external-secrets.io/v1beta1.AzureEnvironmentType)* | EnvironmentType specifies the Azure cloud environment endpoints to use for connecting and authenticating with Azure. By default it points to the public cloud AAD endpoint. The following endpoints are available, also see he... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.042431239038705826,
0.014804212376475334,
-0.035560332238674164,
-0.0330539271235466,
-0.005315903574228287,
0.047236304730176926,
0.033830124884843826,
-0.07593415677547455,
0.07972905039787292,
0.08099061995744705,
0.045569587498903275,
-0.06726628541946411,
0.008510718122124672,
0.06... | 0.010533 |
server sdk. The sdk MUST run with HTTPS to make sure no MITM attack can be performed. | | `caProvider` *[CAProvider](#external-secrets.io/v1beta1.CAProvider)* | *(Optional)* see: <https://external-secrets.io/latest/spec/#external-secrets.io/v1alpha1.CAProvider> | | `organizationID` *string* | OrganizationID determines ... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.06605608016252518,
-0.023459892719984055,
-0.015106253325939178,
-0.008182530291378498,
0.049287039786577225,
-0.013728165067732334,
0.004645094741135836,
0.0019605690613389015,
0.03149978071451187,
0.016242215409874916,
0.038800571113824844,
-0.0715552568435669,
0.04369095340371132,
0.... | 0.06323 |
include your org in the url and terminate the url with a “/” | ### CloudruSMProvider (*Appears on:* [SecretStoreProvider](#external-secrets.io/v1beta1.SecretStoreProvider)) CloudruSMProvider configures a store to sync secrets using the Cloud.ru Secret Manager provider. | Field | Description | | --- | --- | | `auth` *[C... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.05333824083209038,
0.0006223897216841578,
-0.03855146840214729,
0.05571991950273514,
0.005935594439506531,
0.041259851306676865,
-0.045730117708444595,
-0.05483267083764076,
0.05532904341816902,
0.049347784370183945,
-0.01676025427877903,
-0.06204240769147873,
0.06529794633388519,
-0.04... | 0.041933 |
the ClusterExternalSecret | | `failedNamespaces` *[[]ClusterExternalSecretNamespaceFailure](#external-secrets.io/v1beta1.ClusterExternalSecretNamespaceFailure)* | *(Optional)* Failed namespaces are the namespaces that failed to apply an ExternalSecret | | `provisionedNamespaces` *[]string* | *(Optional)* ProvisionedNam... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.08815054595470428,
-0.05650358274579048,
-0.013754424639046192,
0.04062418267130852,
0.06974288076162338,
-0.013651635497808456,
0.04319804906845093,
-0.0338803268969059,
-0.013013084419071674,
-0.010210487060248852,
0.06640558689832687,
-0.10884552448987961,
0.04986327141523361,
-0.016... | 0.192143 |
to authenticate with Conjur using the JWT authentication method. | | `serviceAccountRef` *[External Secrets meta/v1.ServiceAccountSelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#ServiceAccountSelector)* | *(Optional)* Optional ServiceAccountRef specifies the Kubernetes service acc... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.12189770489931107,
-0.0003342691925354302,
0.01477139350026846,
-0.06736203283071518,
-0.07668640464544296,
-0.023091327399015427,
0.05643561854958534,
0.057543009519577026,
0.07591123133897781,
0.009839454665780067,
0.0005078713875263929,
-0.06519278883934021,
0.02234850823879242,
0.00... | 0.106577 |
| --- | | `auth` *[DopplerAuth](#external-secrets.io/v1beta1.DopplerAuth)* | Auth configures how the Operator authenticates with the Doppler API | | `project` *string* | *(Optional)* Doppler project (required if not using a Service Token) | | `config` *string* | *(Optional)* Doppler config (required if not using a Serv... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.103443942964077,
0.001206236076541245,
-0.04917990043759346,
-0.01562145259231329,
0.016566414386034012,
-0.07784774899482727,
0.029549209401011467,
0.071695975959301,
0.0838075578212738,
-0.011722822673618793,
-0.015835603699088097,
-0.05753632262349129,
0.042429592460393906,
-0.005922... | 0.110349 |
*string* | The key in the Kubernetes Secret to store the value. | | `remoteRef` *[ExternalSecretDataRemoteRef](#external-secrets.io/v1beta1.ExternalSecretDataRemoteRef)* | RemoteRef points to the remote secret and defines which secret (version/property/..) to fetch. | | `sourceRef` *[StoreSourceRef](#external-secrets.i... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.05068862810730934,
0.026350917294621468,
0.006138768512755632,
0.005907638464123011,
0.032633695751428604,
0.030833544209599495,
0.06400985270738602,
0.02029181271791458,
0.10920991748571396,
0.03237086161971092,
-0.001293247565627098,
-0.09942788630723953,
-0.0040817297995090485,
-0.04... | 0.03264 |
SecretSyncedError status. | ### ExternalSecretFind (*Appears on:* [ExternalSecretDataFromRemoteRef](#external-secrets.io/v1beta1.ExternalSecretDataFromRemoteRef)) ExternalSecretFind defines criteria for finding secrets in the provider. | Field | Description | | --- | --- | | `path` *string* | *(Optional)* A root path t... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.13006335496902466,
-0.007641240954399109,
-0.07442717999219894,
0.009410196915268898,
0.06165093928575516,
-0.06697012484073639,
-0.0004472261352930218,
0.027784887701272964,
1.9018808927739883e-7,
-0.018398163840174675,
0.04307343065738678,
-0.07176925987005234,
0.04198787733912468,
-0... | 0.071013 |
time before the values are read again from the SecretStore provider, specified as Golang Duration strings. Valid time units are “ns”, “us” (or “µs”), “ms”, “s”, “m”, “h” Example values: “1h0m0s”, “2h30m0s”, “10m0s” May be set to “0s” to fetch and create it once. Defaults to 1h0m0s. | | `data` *[[]ExternalSecretData](#e... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.005924491211771965,
0.039853259921073914,
0.011459377594292164,
-0.001910046092234552,
-0.04739769920706749,
0.02326118014752865,
0.025902487337589264,
0.020961297675967216,
0.0997307077050209,
-0.016219519078731537,
0.07022535055875778,
-0.09023614227771759,
-0.006345140747725964,
-0.0... | 0.048715 |
*string* | | | `version` *string* | | ### FindName (*Appears on:* [ExternalSecretFind](#external-secrets.io/v1beta1.ExternalSecretFind)) FindName defines name matching criteria for finding secrets. | Field | Description | | --- | --- | | `regexp` *string* | *(Optional)* Finds secrets base | ### FortanixProvider (*Appea... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.11966949701309204,
-0.03140489384531975,
-0.048776403069496155,
0.041872717440128326,
0.026698431000113487,
0.00023920599778648466,
-0.019853103905916214,
0.013406259939074516,
0.0029988656751811504,
-0.045866306871175766,
0.01500557642430067,
-0.043147701770067215,
0.028286464512348175,
... | 0.085587 |
`uploadURL` *string* | *(Optional)* Upload URL for enterprise instances. Default to URL. | | `auth` *[GithubAppAuth](#external-secrets.io/v1beta1.GithubAppAuth)* | auth configures how secret-manager authenticates with a Github instance. | | `appID` *int64* | appID specifies the Github APP that will be used to authentic... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.10480834543704987,
-0.03070446290075779,
-0.06689460575580597,
0.0007851150585338473,
0.011865583248436451,
-0.07984837144613266,
-0.02260817028582096,
0.011956140398979187,
0.009953542612493038,
0.019616538658738136,
0.03587795048952103,
-0.012126856483519077,
0.10679851472377777,
-0.0... | 0.11212 |
| ### InfisicalAuth (*Appears on:* [InfisicalProvider](#external-secrets.io/v1beta1.InfisicalProvider)) InfisicalAuth defines the authentication methods for the Infisical provider. | Field | Description | | --- | --- | | `universalAuthCredentials` *[UniversalAuthCredentials](#external-secrets.io/v1beta1.UniversalAuthCr... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.1389390230178833,
0.020056748762726784,
-0.049674008041620255,
-0.004028437193483114,
0.022401580587029457,
-0.0332244411110878,
0.03472796082496643,
-0.015539703890681267,
-0.0013449408579617739,
-0.012060956098139286,
0.0543864481151104,
-0.012993857264518738,
0.04834076017141342,
0.0... | 0.077122 |
onboardbase API Key credentials. | Field | Description | | --- | --- | | `apiKeyRef` *[External Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#SecretKeySelector)* | OnboardbaseAPIKey is the APIKey generated by an admin account. It is used to recognize and... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.06614509969949722,
-0.025682389736175537,
-0.08889452368021011,
0.009600304998457432,
0.015535630285739899,
0.0243170615285635,
0.024990517646074295,
0.01759454235434532,
0.02538885548710823,
0.03920543193817139,
0.015844769775867462,
-0.016855793073773384,
0.048370253294706345,
-0.0210... | 0.074018 |
must be specified if using workload identity. | | `auth` *[OracleAuth](#external-secrets.io/v1beta1.OracleAuth)* | *(Optional)* Auth configures how secret-manager authenticates with the Oracle Vault. If empty, use the instance principal, otherwise the user credentials specified in Auth. | | `serviceAccountRef` *[Extern... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.10120241343975067,
-0.020949650555849075,
-0.09898217022418976,
-0.05436141788959503,
-0.006094431504607201,
-0.026316700503230095,
0.07823915034532547,
0.07151880115270615,
0.019342314451932907,
-0.013150307349860668,
0.026384573429822922,
-0.06605781614780426,
0.03241308778524399,
0.0... | -0.002446 |
create a new organization, visit <https://app.pulumi.com/> and click “New Organization”. | | `project` *string* | Project is the name of the Pulumi ESC project the environment belongs to. | | `environment` *string* | Environment are YAML documents composed of static key-value pairs, programmatic expressions, dynamicall... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.027223005890846252,
-0.08170301467180252,
-0.09076766669750214,
-0.013235950842499733,
0.0036284648813307285,
-0.03993291035294533,
0.02088105119764805,
-0.0408654548227787,
0.044485531747341156,
-0.0026658042334020138,
0.05095024034380913,
-0.13363471627235413,
0.03931457921862602,
-0.... | 0.070656 |
be set | | `retrySettings` *[SecretStoreRetrySettings](#external-secrets.io/v1beta1.SecretStoreRetrySettings)* | *(Optional)* Used to configure HTTP retries on failures. | | `refreshInterval` *int* | *(Optional)* Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config. | | ... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.045915670692920685,
-0.030057989060878754,
-0.06410352885723114,
0.08070313185453415,
0.005616864189505577,
0.00508312089368701,
-0.03195714205503464,
0.0015779008390381932,
-0.028894910588860512,
0.042934734374284744,
0.05538533255457878,
-0.04663464054465294,
0.04473401978611946,
-0.0... | 0.085367 |
Previder provider | | `onboardbase` *[OnboardbaseProvider](#external-secrets.io/v1beta1.OnboardbaseProvider)* | *(Optional)* Onboardbase configures this store to sync secrets using the Onboardbase provider | | `keepersecurity` *[KeeperSecurityProvider](#external-secrets.io/v1beta1.KeeperSecurityProvider)* | *(Optional)... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.10526450723409653,
-0.019863827154040337,
-0.07595019042491913,
-0.052217982709407806,
0.022180607542395592,
-0.0031955346930772066,
0.028148356825113297,
0.0065061175264418125,
0.011541618965566158,
0.033684443682432175,
0.05551264062523842,
-0.047031208872795105,
0.04079664871096611,
... | 0.074641 |
with AWS SecretsManager. Some of these settings are only applicable to controlling how secrets are deleted, and hence only apply to PushSecret (and only when deletionPolicy is set to Delete). | Field | Description | | --- | --- | | `forceDeleteWithoutRecovery` *bool* | *(Optional)* Specifies whether to delete the secre... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.057931702584028244,
-0.0074916924349963665,
0.00031801516888663173,
0.08656254410743713,
0.03303457796573639,
0.0354510098695755,
-0.016440074890851974,
-0.06265129894018173,
0.1107359230518341,
0.03144421800971031,
0.023495759814977646,
-0.0038373987190425396,
0.019114162772893906,
-0.... | -0.046992 |
| Value | Description | | --- | --- | | "Merge" | MergePolicyMerge merges the template content with existing values. | | "Replace" | MergePolicyReplace replaces the entire template content during merge operations. | ### TemplateRef (*Appears on:* [TemplateFrom](#external-secrets.io/v1beta1.TemplateFrom)) TemplateRef de... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.08864828944206238,
0.057013530284166336,
-0.008723669685423374,
0.04519046097993851,
0.06872747093439102,
0.037805549800395966,
0.032586127519607544,
0.037159666419029236,
-0.006146782077848911,
0.006558030378073454,
0.026901915669441223,
-0.046326857060194016,
0.038118038326501846,
-0.... | 0.073723 |
with Vault. The `key` field must be specified and denotes which entry within the Secret resource is used as the app role secret. | ### VaultAuth (*Appears on:* [VaultProvider](#external-secrets.io/v1beta1.VaultProvider)) VaultAuth is the configuration used to authenticate with a Vault server. Only one of `tokenSecretRe... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.0027707149274647236,
-0.002688803942874074,
-0.04750118404626846,
-0.04342922195792198,
-0.043352141976356506,
-0.04200128838419914,
0.005173734854906797,
0.027402902022004128,
0.08834914118051529,
-0.014438416808843613,
-0.02409655787050724,
-0.06303068995475769,
0.09313283115625381,
0... | 0.01708 |
Secrets meta/v1.SecretKeySelector](https://pkg.go.dev/github.com/external-secrets/external-secrets/apis/meta/v1#SecretKeySelector)* | *(Optional)* SecretRef to a key in a Secret resource containing client private key to authenticate with Vault using the Cert authentication method | ### VaultClientTLS (*Appears on:* [Va... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.07609812915325165,
0.05543812736868858,
-0.053763341158628464,
0.006178496405482292,
0.02798907458782196,
-0.04668683931231499,
0.019959649071097374,
0.029261397197842598,
0.10662485659122467,
-0.04926735535264015,
0.033910416066646576,
-0.007006686646491289,
0.05939353629946709,
0.0602... | -0.011987 |
| *(Optional)* Optional service account field containing the name of a kubernetes ServiceAccount. If the service account is specified, the service account secret token JWT will be used for authenticating with Vault. If the service account selector is not supplied, the secretRef will be used instead. | | `secretRef` *[E... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.06843015551567078,
0.011303607374429703,
-0.0010304837487637997,
-0.03953108191490173,
-0.006872282829135656,
0.024504419416189194,
0.03831728547811508,
0.0015141295734792948,
0.11731956154108047,
-0.0010475621093064547,
0.01601528562605381,
-0.06479571759700775,
0.048413775861263275,
-... | 0.076309 |
plain HTTP protocol connection. If not set the system root certificates are used to validate the TLS connection. | | `tls` *[VaultClientTLS](#external-secrets.io/v1beta1.VaultClientTLS)* | *(Optional)* The configuration used for client side related TLS communication, when the Vault server requires mutual authentication... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.0002954718947876245,
0.04352777078747749,
-0.06266414374113083,
-0.018078763037919998,
-0.022528642788529396,
-0.07595109939575195,
-0.07649786025285721,
-0.012639750726521015,
0.10666114836931229,
-0.0312526561319828,
0.017618393525481224,
0.022220635786652565,
0.08882485330104828,
0.0... | -0.056691 |
*(Optional)* PEM encoded CA bundle used to validate webhook server certificate. Only used if the Server URL is using HTTPS protocol. This parameter is ignored for plain HTTP protocol connection. If not set the system root certificates are used to validate the TLS connection. | | `caProvider` *[WebhookCAProvider](#exter... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.11399620771408081,
0.14259406924247742,
-0.06251142174005508,
-0.009576953016221523,
0.01602843403816223,
-0.08508121222257614,
-0.026436002925038338,
-0.016387566924095154,
0.04322589188814163,
-0.015846705064177513,
0.03722856566309929,
-0.14790482819080353,
0.04984867200255394,
0.009... | 0.025825 |
`tenantId` *string* | TenantID configures the Azure Tenant to send requests to. Required for ServicePrincipal auth type. | | `registry` *string* | the domain name of the ACR registry e.g. foobarexample.azurecr.io | | `scope` *string* | *(Optional)* Define the scope for the access token, e.g. pull/push access for a repo... | https://github.com/external-secrets/external-secrets/blob/main//docs/api/spec.md | main | external-secrets | [
-0.053964413702487946,
-0.003744155168533325,
-0.03218415006995201,
0.02794293686747551,
-0.04420674592256546,
-0.006609160453081131,
0.0030221259221434593,
-0.03961994871497154,
0.06641438603401184,
0.08362467586994171,
0.009731052443385124,
-0.05869535356760025,
0.04880537837743759,
0.02... | 0.000287 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.