Skip to content

Commit 174c510

Browse files
[AWS SSM parameter store] Add prefix option (#3920)
* add prefix to spec Signed-off-by: Hannah Hunter <[email protected]> * add prefix to example Signed-off-by: Hannah Hunter <[email protected]> --------- Signed-off-by: Hannah Hunter <[email protected]> Co-authored-by: Mark Fussell <[email protected]>
1 parent 20494df commit 174c510

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

daprdocs/content/en/reference/components-reference/supported-secret-stores/aws-parameter-store.md

+3
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ spec:
3030
value: "[aws_secret_key]"
3131
- name: sessionToken
3232
value: "[aws_session_token]"
33+
- name: prefix
34+
value: "[secret_name]"
3335
```
3436
{{% alert title="Warning" color="warning" %}}
3537
The above example uses secrets as plain strings. It is recommended to use a local secret store such as [Kubernetes secret store]({{< ref kubernetes-secret-store.md >}}) or a [local file]({{< ref file-secret-store.md >}}) to bootstrap secure key storage.
@@ -43,6 +45,7 @@ The above example uses secrets as plain strings. It is recommended to use a loca
4345
| accessKey | Y | The AWS Access Key to access this resource | `"key"` |
4446
| secretKey | Y | The AWS Secret Access Key to access this resource | `"secretAccessKey"` |
4547
| sessionToken | N | The AWS session token to use | `"sessionToken"` |
48+
| prefix | N | Allows you to specify more than one SSM parameter store secret store component. | `"prefix"` |
4649
4750
{{% alert title="Important" color="warning" %}}
4851
When running the Dapr sidecar (daprd) with your application on EKS (AWS Kubernetes), if you're using a node/pod that has already been attached to an IAM policy defining access to AWS resources, you **must not** provide AWS access-key, secret-key, and tokens in the definition of the component spec you're using.

0 commit comments

Comments
 (0)