diff --git a/manifests/external-secrets/kibana/external-secret-int.yaml b/manifests/external-secrets/kibana/external-secret-int.yaml new file mode 100644 index 0000000..53f3d54 --- /dev/null +++ b/manifests/external-secrets/kibana/external-secret-int.yaml @@ -0,0 +1,22 @@ +apiVersion: external-secrets.io/v1beta1 +kind: ExternalSecret +metadata: + name: kibana-int-credentials + namespace: monitoring +spec: + refreshInterval: 1h + secretStoreRef: + name: vault-backend + kind: ClusterSecretStore + target: + name: kibana-int-credentials + creationPolicy: Owner + data: + - secretKey: username + remoteRef: + key: vault-internal-users/kibana-credentials + property: kibana-int-username + - secretKey: password + remoteRef: + key: vault-internal-users/kibana-credentials + property: kibana-int-password diff --git a/manifests/external-secrets/kibana/external-secret-prod.yaml b/manifests/external-secrets/kibana/external-secret-prod.yaml new file mode 100644 index 0000000..9a27e41 --- /dev/null +++ b/manifests/external-secrets/kibana/external-secret-prod.yaml @@ -0,0 +1,22 @@ +apiVersion: external-secrets.io/v1beta1 +kind: ExternalSecret +metadata: + name: kibana-int-credentials + namespace: monitoring +spec: + refreshInterval: 1h + secretStoreRef: + name: vault-backend + kind: ClusterSecretStore + target: + name: kibana-prod-credentials + creationPolicy: Owner + data: + - secretKey: username + remoteRef: + key: vault-internal-users/kibana-credentials + property: kibana-prod-username + - secretKey: password + remoteRef: + key: vault-internal-users/kibana-credentials + property: kibana-prod-password