Open akshayvvr opened 3 years ago
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close
.
Provide feedback via https://github.com/aws-controllers-k8s/community.
/lifecycle stale
/remove-lifecycle stale
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close
.
Provide feedback via https://github.com/aws-controllers-k8s/community.
/lifecycle stale
/lifecycle frozen
Existing solutions allow AWS Secrets to be exposed as k8s secrets.
Nice gap to fill first might be creating the AWS Secret in Secrets Manager.
would be great to have it !
also supporting parameter_store would make this even better, unless that should be under the ssm preview?
also supporting parameter_store would make this even better, unless that should be under the ssm preview?
* https://docs.aws.amazon.com/systems-manager/latest/APIReference/API_GetParameter.html * https://docs.aws.amazon.com/systems-manager/latest/APIReference/API_PutParameter.html * https://docs.aws.amazon.com/systems-manager/latest/APIReference/API_DeleteParameter.html
The AWS SDK for Go has PutParameter
in the ssm
package, which means this feature would be included in the ssm-controller
: https://docs.aws.amazon.com/sdk-for-go/api/service/ssm/#SSM.PutParameter
New ACK Service Controller
Support for AWS Secrets Manager
List of API resources
List the API resources in order of importance to you:
1) Secret resources
Ability to create secrets and if possible mapping it to K8s Secret would be great.