-
Notifications
You must be signed in to change notification settings - Fork 35
Feature request - support multiple Secrets injection #41
Comments
That's right. There is a fork of this project that supports multiple secrets. |
Thanks for the fast response! Would you mind sharing it? |
See the aws-samples:multi-secret branch. There are no plans to merge it at the moment. |
It's quite a fundamental bit of functionality :"requesting more than one secret". |
How to get helm chart for |
This Feature is really important in case of injecting my |
wonderful and easy to use tool, but indeed, a multi-secret feature would help a lot |
@jicowan |
@bjethwan I think it might be related with the recommendation to use the just release ASCP project, as describe in this project's README. You can give it a try, it seems to work just fine within our EKS implementation |
@adriantaut |
@bjethwan ah ok, wondering why it does not fit it. I think you can disable the reconciler |
@bjethwan @adriantaut The cost of polling is pretty negligible ($0.05 per 10,000 API calls) and you can configure the polling interval or disable it all together. We are not supporting the multi-secret branch because it is a complete re-write of the sidecar/admission controller and we're not prepared to support it. We were hoping the contributor would maintain it, but that has not come to pass. |
We ended up writing our own service to support this request, I can share the source code if interested. |
sure @AmitBaranes I would be interested |
@AmitBaranes - Also interested, looking at keeping secrets out of k8s "secrets" objects, but still utilize k8s IRSA |
As much as I can tell, Currently, We can inject one secret only using
secrets.k8s.aws/secret-arn
.Would be nice to inject multiple secrets into a given pod.
The text was updated successfully, but these errors were encountered: