@@ -18,8 +18,36 @@ cronjobConfigs:
1818  suspend : false 
1919  successfulJobsHistoryLimit : 3 
2020  failedJobsHistoryLimit : 1 
21-   restartPolicy : OnFailure 
2221  timeZone : " UTC" 
22+ cronJobAnnotations :
23+   example.com/dummy : " true" 
24+ cronJobLabels :
25+   example.com/dummy : " true" 
26+ LivenessProbe :
27+   Path : " /" 
28+   command : [] 
29+   failureThreshold : 3 
30+   httpHeaders : [] 
31+   initialDelaySeconds : 20 
32+   periodSeconds : 10 
33+   port : 8080 
34+   scheme : " " 
35+   successThreshold : 1 
36+   tcp : false 
37+   timeoutSeconds : 5 
38+ ReadinessProbe :
39+   Path : " /" 
40+   command : [] 
41+   failureThreshold : 3 
42+   httpHeaders : [] 
43+   initialDelaySeconds : 20 
44+   periodSeconds : 10 
45+   port : 8080 
46+   scheme : " " 
47+   successThreshold : 1 
48+   tcp : false 
49+   timeoutSeconds : 5 
50+ restartPolicy : Always 
2351
2452imagePullSecrets :
2553  - test1 
@@ -222,25 +250,34 @@ ConfigMaps:
222250ConfigSecrets :
223251  enabled : true 
224252  secrets :
225-   - name : config-secret-1 
226-     type : environment 
227-     external : true 
228-     externalType : ESO_AWSSecretsManager 
229-     esoSecretData :
230-       secretStoreRef :
231-         kind : ClusteSecret 
232-         name : test-secret 
233-         aws :
234-           service : SecretsManager 
235-           region : us-east-1 
236-           auth :
237-             secretRef :
238-               accessKeyIDSecretRef :
239-                 name : awssm-secret 
240-                 key : access-key 
241-               secretAccessKeySecretRef :
242-                 name : awssm-secret 
243-                 key : secret-access-key 
253+     - name : config-secret-1 
254+       type : environment 
255+       external : true 
256+       externalType : ESO_AWSSecretsManager 
257+       esoSecretData :
258+         refreshInterval : " 30m" 
259+ 
260+         #  Option 1: Define an inline SecretStore
261+         secretStore :
262+           aws :
263+             service : SecretsManager 
264+             region : us-east-1 
265+             auth :
266+               secretRef :
267+                 accessKeyIDSecretRef :
268+                   name : awssm-secret 
269+                   key : access-key 
270+                 secretAccessKeySecretRef :
271+                   name : awssm-secret 
272+                   key : secret-access-key 
273+ 
274+         #  Option 2: Reference an existing SecretStore / ClusterSecretStore
275+         #  (comment out if not needed)
276+         secretStoreRef :
277+           kind : ClusterSecretStore    #  or SecretStore
278+           name : test-secret 
279+ 
280+         #  Map individual keys from AWS Secrets Manager into K8s Secret
244281      esoData :
245282        - secretKey : prod-mysql-password 
246283          key : secrets/prod-mysql-secrets 
@@ -254,10 +291,10 @@ ConfigSecrets:
254291        - secretKey : prod-mysql-password 
255292          key : secrets/prod-mysql-secrets 
256293          property : prodPassword 
257-     data :
258-       key1 : key1value-1 
259-       key2 : key2value-1 
260-       key3 : key3value-1 
294+        data :
295+          key1 : key1value-1 
296+          key2 : key2value-1 
297+          key3 : key3value-1 
261298  #  - name: config-secret-1
262299  #    type: environment
263300  #    external: false
0 commit comments