Questions regarding the AWS Secrets Manager feature with Authentication #5426
Replies: 3 comments 11 replies
-
Yeah, you should be able. If you are using
You can just read from one Secret Manager at once, reading multiple key/values from it. (Or maybe I've not got your question) |
Beta Was this translation helpful? Give feedback.
-
@JorTurFer thanks for the answer! Yes, I am using aws pod identity. Do you happen to have a working example on how can I specify a different AWS account in the TriggerAuthentication using the AWS Secrets Manager? I know the region could be set but I don't see a parameter to pass in a different AWS account. CC: @geoffrey1330 |
Beta Was this translation helpful? Give feedback.
-
I have a similar question. Instead of doing sending an
could I just send the IRSA (IAM Role) like this?
|
Beta Was this translation helpful? Give feedback.
-
Hi KEDA community, thanks so much for the great effort you have put in this tool.
I wanted to ask regarding the new feature that allows to retrieve secrets from AWS Secrets Manager to be used for authentication: https://keda.sh/docs/2.13/concepts/authentication/#aws-secret-managers
The feature has been great!
I wanted to know if this feature has support to specify an AWS account? - For my use case, I will have the secrets stored in one AWS account, at one single region. Then my EKS clusters from separate accounts and regions can retrieve the secret from one central place instead of having to replicate the secrets across AWS accounts and regions.
Another question is if we can specify a key inside the secret retrieve? - From my assumption, how the feature works is that I will need two separate AWS Secrets Manager resources if I have username and password, the values of the secrets will have to be plain text. Will it support to have one AWS Secrets Manager resource and inside the secret I specify a key and value for username, key and value for password?
Thanks for your time!
Beta Was this translation helpful? Give feedback.
All reactions