Storing secrets in AWS Secrets Manager
First, we need to store a secret in AWS Secrets Manager, lets do that using the AWS CLI:
~$export SECRET_SUFFIX=$(openssl rand -hex 4)
~$export SECRET_NAME="$EKS_CLUSTER_NAME-catalog-secret-${SECRET_SUFFIX}"
~$aws secretsmanager create-secret --name "$SECRET_NAME" \
--secret-string '{"username":"catalog_user", "password":"default_password"}' --region $AWS_REGION
{
"ARN": "arn:aws:secretsmanager:$AWS_REGION:$AWS_ACCOUNT_ID:secret:$EKS_CLUSTER_NAME/catalog-secret-ABCdef",
"Name": "eks-workshop/static-secret",
"VersionId": "7e0b352d-6666-4444-aaaa-cec1f1d2df1b"
}
The command above is storing a secret with a JSON encoded key/value content, for username
and password
credentials.
Validate the new stored secret in the AWS Secrets Manager Console or using this command:
~$aws secretsmanager describe-secret --secret-id "$SECRET_NAME"
{
"ARN": "arn:aws:secretsmanager:us-west-2:1234567890:secret:eks-workshop/catalog-secret-WDD8yS",
"Name": "eks-workshop/catalog-secret",
"LastChangedDate": "2023-10-10T20:44:51.882000+00:00",
"VersionIdsToStages": {
"94d1fe43-87f5-42fb-bf28-f6b090f0ca44": [
"AWSCURRENT"
]
},
"CreatedDate": "2023-10-10T20:44:51.439000+00:00"
}