@@ -18,8 +18,36 @@ cronjobConfigs:
1818 suspend : false
1919 successfulJobsHistoryLimit : 3
2020 failedJobsHistoryLimit : 1
21- restartPolicy : OnFailure
2221 timeZone : " UTC"
22+ cronJobAnnotations :
23+ example.com/dummy : " true"
24+ cronJobLabels :
25+ example.com/dummy : " true"
26+ LivenessProbe :
27+ Path : " /"
28+ command : []
29+ failureThreshold : 3
30+ httpHeaders : []
31+ initialDelaySeconds : 20
32+ periodSeconds : 10
33+ port : 8080
34+ scheme : " "
35+ successThreshold : 1
36+ tcp : false
37+ timeoutSeconds : 5
38+ ReadinessProbe :
39+ Path : " /"
40+ command : []
41+ failureThreshold : 3
42+ httpHeaders : []
43+ initialDelaySeconds : 20
44+ periodSeconds : 10
45+ port : 8080
46+ scheme : " "
47+ successThreshold : 1
48+ tcp : false
49+ timeoutSeconds : 5
50+ restartPolicy : Always
2351
2452imagePullSecrets :
2553 - test1
@@ -222,25 +250,34 @@ ConfigMaps:
222250ConfigSecrets :
223251 enabled : true
224252 secrets :
225- - name : config-secret-1
226- type : environment
227- external : true
228- externalType : ESO_AWSSecretsManager
229- esoSecretData :
230- secretStoreRef :
231- kind : ClusteSecret
232- name : test-secret
233- aws :
234- service : SecretsManager
235- region : us-east-1
236- auth :
237- secretRef :
238- accessKeyIDSecretRef :
239- name : awssm-secret
240- key : access-key
241- secretAccessKeySecretRef :
242- name : awssm-secret
243- key : secret-access-key
253+ - name : config-secret-1
254+ type : environment
255+ external : true
256+ externalType : ESO_AWSSecretsManager
257+ esoSecretData :
258+ refreshInterval : " 30m"
259+
260+ # Option 1: Define an inline SecretStore
261+ secretStore :
262+ aws :
263+ service : SecretsManager
264+ region : us-east-1
265+ auth :
266+ secretRef :
267+ accessKeyIDSecretRef :
268+ name : awssm-secret
269+ key : access-key
270+ secretAccessKeySecretRef :
271+ name : awssm-secret
272+ key : secret-access-key
273+
274+ # Option 2: Reference an existing SecretStore / ClusterSecretStore
275+ # (comment out if not needed)
276+ secretStoreRef :
277+ kind : ClusterSecretStore # or SecretStore
278+ name : test-secret
279+
280+ # Map individual keys from AWS Secrets Manager into K8s Secret
244281 esoData :
245282 - secretKey : prod-mysql-password
246283 key : secrets/prod-mysql-secrets
@@ -254,10 +291,10 @@ ConfigSecrets:
254291 - secretKey : prod-mysql-password
255292 key : secrets/prod-mysql-secrets
256293 property : prodPassword
257- data :
258- key1 : key1value-1
259- key2 : key2value-1
260- key3 : key3value-1
294+ data :
295+ key1 : key1value-1
296+ key2 : key2value-1
297+ key3 : key3value-1
261298 # - name: config-secret-1
262299 # type: environment
263300 # external: false
0 commit comments