You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jul 26, 2022. It is now read-only.
Hi,
I was trying ExternalSecret with Azure keyvault located in US GovCloud.
The yaml expects a parameter named "keyVaultName": mykeyvault, which specifies the name of keyvault.
When trying to fetch credentials from keyvault, the URL that is hit is automatically composed from this as https://mykeyvault.vault.azure.net/secrets/secret1/?api-version=7.1
This means that it is assuming my keyvault is located in public cloud.
My question is , do we have some sort of parameter to tell it to use different cloud, or if that is not an option, can I somehow tell it to pick different endpoint instead of ".vault.azure.net" ?
The text was updated successfully, but these errors were encountered:
currently, this is hard-coded. You could make that configurable here. Also, there's a external-secrets rewrite in go. Unfortunately, the Azure KV provider is not ready yet (but will be very soon): https://github.com/external-secrets/external-secrets
Hi,
I was trying ExternalSecret with Azure keyvault located in US GovCloud.
The yaml expects a parameter named "keyVaultName": mykeyvault, which specifies the name of keyvault.
When trying to fetch credentials from keyvault, the URL that is hit is automatically composed from this as
https://mykeyvault.vault.azure.net/secrets/secret1/?api-version=7.1
This means that it is assuming my keyvault is located in public cloud.
My question is , do we have some sort of parameter to tell it to use different cloud, or if that is not an option, can I somehow tell it to pick different endpoint instead of ".vault.azure.net" ?
The text was updated successfully, but these errors were encountered: