You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/secrets-store-aws.adoc
+15-16Lines changed: 15 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,22 +15,22 @@ endif::[]
15
15
[id="secrets-store-aws_{context}"]
16
16
= Mounting secrets from {secrets-store-provider}
17
17
18
-
You can use the {secrets-store-operator} to mount secrets from {secrets-store-provider} to a Container Storage Interface (CSI) volume in {product-title}. To mount secrets from {secrets-store-provider}, your cluster must be installed on AWS and use AWS Security Token Service (STS).
18
+
You can use the {secrets-store-operator} to mount secrets from {secrets-store-provider}external secrets store to a Container Storage Interface (CSI) volume in {product-title}.
19
19
20
20
.Prerequisites
21
21
22
-
* Your cluster is installed on AWS and uses AWS Security Token Service (STS).
23
-
* You installed the {secrets-store-operator}. See _Installing the {secrets-store-driver}_ for instructions.
24
-
* You configured {secrets-store-provider} to store the required secrets.
25
-
* You extracted and prepared the `ccoctl` binary.
26
-
* You installed the `jq` CLI tool.
27
22
* You have access to the cluster as a user with the `cluster-admin` role.
23
+
* You have installed the `jq` tool.
24
+
* You have extracted and prepared the `ccoctl` utility.
25
+
* You have installed the cluster on {aws-first} and the cluster uses {aws-short} Security Token Service (STS).
26
+
* You have installed the {secrets-store-operator}. For more information, see "Installing the {secrets-store-driver}".
27
+
* You have configured {secrets-store-provider} to store the required secrets.
28
28
29
29
.Procedure
30
30
31
31
. Install the {secrets-store-provider} provider:
32
32
33
-
.. Create a YAML file with the following configuration for the provider resources:
33
+
.. Create a YAML file by using the following example configuration:
Copy file name to clipboardExpand all lines: modules/secrets-store-azure.adoc
+20-20Lines changed: 20 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,29 +4,29 @@
4
4
5
5
:_mod-docs-content-type: PROCEDURE
6
6
[id="secrets-store-azure_{context}"]
7
-
= Mounting secrets from Azure Key Vault
7
+
= Mounting secrets from {azure-short} Key Vault
8
8
9
-
You can use the {secrets-store-operator} to mount secrets from Azure Key Vault to a Container Storage Interface (CSI) volume in {product-title}. To mount secrets from Azure Key Vault, your cluster must be installed on Microsoft Azure.
9
+
You can use the {secrets-store-operator} to mount secrets from {azure-first} Key Vault to a Container Storage Interface (CSI) volume in {product-title}. To mount secrets from {azure-short} Key Vault.
10
10
11
11
.Prerequisites
12
12
13
-
* Your cluster is installed on Azure.
14
-
* You installed the {secrets-store-operator}. See _Installing the {secrets-store-driver}_ for instructions.
15
-
* You configured Azure Key Vault to store the required secrets.
16
-
* You installed the Azure CLI (`az`).
13
+
* Your have installed a cluster on {azure-short}.
17
14
* You have access to the cluster as a user with the `cluster-admin` role.
15
+
* You have installed the {azure-short} CLI (`az`).
16
+
* You have installed the {secrets-store-operator}. See "Installing the {secrets-store-driver}" for instructions.
17
+
* You have configured {azure-short} Key Vault to store the required secrets.
18
18
19
19
.Procedure
20
20
21
-
. Install the Azure Key Vault provider:
21
+
. Install the {azure-short} Key Vault provider:
22
22
23
-
.. Create a YAML file with the following configuration for the provider resources:
23
+
.. Create a YAML file named `azure-provider.yaml` that defines the `ServiceAccount` resource configuration. See the following example configuration:
24
24
+
25
25
[IMPORTANT]
26
26
====
27
-
The Azure Key Vault provider for the {secrets-store-driver} is an upstream provider.
27
+
The {azure-short} Key Vault provider for the {secrets-store-driver} is an upstream provider.
28
28
29
-
This configuration is modified from the configuration provided in the upstream link:https://azure.github.io/secrets-store-csi-driver-provider-azure/docs/getting-started/installation/[Azure documentation] so that it works properly with {product-title}. Changes to this configuration might impact functionality.
29
+
This configuration is modified from the configuration provided in the upstream link:https://azure.github.io/secrets-store-csi-driver-provider-azure/docs/getting-started/installation/[{azure-short} documentation] so that it works properly with {product-title}. Changes to this configuration might impact functionality.
Copy file name to clipboardExpand all lines: modules/secrets-store-google.adoc
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,16 +10,16 @@ You can use the {secrets-store-operator} to mount secrets from Google Secret Man
10
10
11
11
.Prerequisites
12
12
13
-
* You installed the {secrets-store-operator}. See _Installing the {secrets-store-driver}_ for instructions.
14
-
* You configured Google Secret Manager to store the required secrets.
15
-
* You created a service account key named `key.json` from your {gcp-full} service account.
16
13
* You have access to the cluster as a user with the `cluster-admin` role.
14
+
* You have installed the {secrets-store-operator}. See "Installing the {secrets-store-driver}" for instructions.
15
+
* You have configured Google Secret Manager to store the required secrets.
16
+
* You have created a service account key named `key.json` from your {gcp-full} service account.
17
17
18
18
.Procedure
19
19
20
20
. Install the Google Secret Manager provider:
21
21
22
-
.. Create a YAML file with the following configuration for the provider resources:
22
+
.. Create a YAML file Create a YAML file named `gcp-provider.yaml` that defines the `ServiceAccount` resource configuration. See the following example configuration:
0 commit comments