apiVersion: external-secrets.io/v1beta1 kind: ExternalSecret metadata: name: external-longhorn-backup-token-secret spec: secretStoreRef: name: vault-longhorn kind: SecretStore target: name: longhorn-backup-token-secret data: - secretKey: AWS_ACCESS_KEY_ID remoteRef: key: longhorn/backup property: AWS_ACCESS_KEY_ID - secretKey: AWS_ENDPOINTS remoteRef: key: longhorn/backup property: AWS_ENDPOINTS - secretKey: AWS_SECRET_ACCESS_KEY remoteRef: key: longhorn/backup property: AWS_SECRET_ACCESS_KEY --- apiVersion: external-secrets.io/v1beta1 kind: SecretStore metadata: name: vault-longhorn spec: provider: vault: server: "http://vault.vault.svc.cluster.local:8200" path: "longhorn" version: "v2" auth: kubernetes: mountPath: "kubernetes" role: "external-secrets"