external-secret-access-user
). You can uncheck Console Access Required.
ACCESS_KEY_ID
and AWS_SECRET_ACCESS_KEY
and keep them handy.
arn:aws:iam::<account-id>:user/<user-name>
).
external-secret-access-policy
) with the following JSON:
<REGION>
and <ACCOUNT-ID>
with your AWS region and account ID.
<IAM-USER-ARN>
with the ARN of the user created in step 1.
prod/secrets/rabbitmq
.
Key | Value |
---|---|
RABBITMQ_DEFAULT_USER | plane |
RABBITMQ_DEFAULT_PASS | plane123 |
<ACCOUNT-ID>
and <IAM ROLE>
with your AWS account ID and the role name created in Step 5.
https://<vault-domain>/
.
secrets/rabbitmq_secrets
). For this example, we’re setting up RabbitMQ credentials:
Key | Value |
---|---|
RABBITMQ_DEFAULT_USER | plane |
RABBITMQ_DEFAULT_PASS | plane123 |
<vault-domain>
with your Vault server address.