published on Monday, Apr 27, 2026 by akeyless-community
published on Monday, Apr 27, 2026 by akeyless-community
Amazon Elastic Kubernetes Service (Amazon EKS) dynamic secret
Create DynamicSecretEks Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new DynamicSecretEks(name: string, args?: DynamicSecretEksArgs, opts?: CustomResourceOptions);@overload
def DynamicSecretEks(resource_name: str,
args: Optional[DynamicSecretEksArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def DynamicSecretEks(resource_name: str,
opts: Optional[ResourceOptions] = None,
delete_protection: Optional[str] = None,
description: Optional[str] = None,
dynamic_secret_eks_id: Optional[str] = None,
eks_access_key_id: Optional[str] = None,
eks_assume_role: Optional[str] = None,
eks_cluster_ca_cert: Optional[str] = None,
eks_cluster_endpoint: Optional[str] = None,
eks_cluster_name: Optional[str] = None,
eks_region: Optional[str] = None,
eks_secret_access_key: Optional[str] = None,
encryption_key_name: Optional[str] = None,
item_custom_fields: Optional[Mapping[str, str]] = None,
name: Optional[str] = None,
secure_access_allow_port_forwading: Optional[bool] = None,
secure_access_bastion_issuer: Optional[str] = None,
secure_access_certificate_issuer: Optional[str] = None,
secure_access_cluster_endpoint: Optional[str] = None,
secure_access_delay: Optional[float] = None,
secure_access_enable: Optional[str] = None,
secure_access_web: Optional[bool] = None,
tags: Optional[Sequence[str]] = None,
target_name: Optional[str] = None,
user_ttl: Optional[str] = None)func NewDynamicSecretEks(ctx *Context, name string, args *DynamicSecretEksArgs, opts ...ResourceOption) (*DynamicSecretEks, error)public DynamicSecretEks(string name, DynamicSecretEksArgs? args = null, CustomResourceOptions? opts = null)
public DynamicSecretEks(String name, DynamicSecretEksArgs args)
public DynamicSecretEks(String name, DynamicSecretEksArgs args, CustomResourceOptions options)
type: akeyless:DynamicSecretEks
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
resource "akeyless_dynamicsecreteks" "name" {
# resource properties
}Parameters
- name string
- The unique name of the resource.
- args DynamicSecretEksArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args DynamicSecretEksArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args DynamicSecretEksArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args DynamicSecretEksArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args DynamicSecretEksArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var dynamicSecretEksResource = new Akeyless.DynamicSecretEks("dynamicSecretEksResource", new()
{
DeleteProtection = "string",
Description = "string",
DynamicSecretEksId = "string",
EksAccessKeyId = "string",
EksAssumeRole = "string",
EksClusterCaCert = "string",
EksClusterEndpoint = "string",
EksClusterName = "string",
EksRegion = "string",
EksSecretAccessKey = "string",
EncryptionKeyName = "string",
ItemCustomFields =
{
{ "string", "string" },
},
Name = "string",
SecureAccessAllowPortForwading = false,
SecureAccessCertificateIssuer = "string",
SecureAccessClusterEndpoint = "string",
SecureAccessDelay = 0,
SecureAccessEnable = "string",
SecureAccessWeb = false,
Tags = new[]
{
"string",
},
TargetName = "string",
UserTtl = "string",
});
example, err := akeyless.NewDynamicSecretEks(ctx, "dynamicSecretEksResource", &akeyless.DynamicSecretEksArgs{
DeleteProtection: pulumi.String("string"),
Description: pulumi.String("string"),
DynamicSecretEksId: pulumi.String("string"),
EksAccessKeyId: pulumi.String("string"),
EksAssumeRole: pulumi.String("string"),
EksClusterCaCert: pulumi.String("string"),
EksClusterEndpoint: pulumi.String("string"),
EksClusterName: pulumi.String("string"),
EksRegion: pulumi.String("string"),
EksSecretAccessKey: pulumi.String("string"),
EncryptionKeyName: pulumi.String("string"),
ItemCustomFields: pulumi.StringMap{
"string": pulumi.String("string"),
},
Name: pulumi.String("string"),
SecureAccessAllowPortForwading: pulumi.Bool(false),
SecureAccessCertificateIssuer: pulumi.String("string"),
SecureAccessClusterEndpoint: pulumi.String("string"),
SecureAccessDelay: pulumi.Float64(0),
SecureAccessEnable: pulumi.String("string"),
SecureAccessWeb: pulumi.Bool(false),
Tags: pulumi.StringArray{
pulumi.String("string"),
},
TargetName: pulumi.String("string"),
UserTtl: pulumi.String("string"),
})
resource "akeyless_dynamicsecreteks" "dynamicSecretEksResource" {
delete_protection = "string"
description = "string"
dynamic_secret_eks_id = "string"
eks_access_key_id = "string"
eks_assume_role = "string"
eks_cluster_ca_cert = "string"
eks_cluster_endpoint = "string"
eks_cluster_name = "string"
eks_region = "string"
eks_secret_access_key = "string"
encryption_key_name = "string"
item_custom_fields = {
"string" = "string"
}
name = "string"
secure_access_allow_port_forwading = false
secure_access_certificate_issuer = "string"
secure_access_cluster_endpoint = "string"
secure_access_delay = 0
secure_access_enable = "string"
secure_access_web = false
tags = ["string"]
target_name = "string"
user_ttl = "string"
}
var dynamicSecretEksResource = new DynamicSecretEks("dynamicSecretEksResource", DynamicSecretEksArgs.builder()
.deleteProtection("string")
.description("string")
.dynamicSecretEksId("string")
.eksAccessKeyId("string")
.eksAssumeRole("string")
.eksClusterCaCert("string")
.eksClusterEndpoint("string")
.eksClusterName("string")
.eksRegion("string")
.eksSecretAccessKey("string")
.encryptionKeyName("string")
.itemCustomFields(Map.of("string", "string"))
.name("string")
.secureAccessAllowPortForwading(false)
.secureAccessCertificateIssuer("string")
.secureAccessClusterEndpoint("string")
.secureAccessDelay(0.0)
.secureAccessEnable("string")
.secureAccessWeb(false)
.tags("string")
.targetName("string")
.userTtl("string")
.build());
dynamic_secret_eks_resource = akeyless.DynamicSecretEks("dynamicSecretEksResource",
delete_protection="string",
description="string",
dynamic_secret_eks_id="string",
eks_access_key_id="string",
eks_assume_role="string",
eks_cluster_ca_cert="string",
eks_cluster_endpoint="string",
eks_cluster_name="string",
eks_region="string",
eks_secret_access_key="string",
encryption_key_name="string",
item_custom_fields={
"string": "string",
},
name="string",
secure_access_allow_port_forwading=False,
secure_access_certificate_issuer="string",
secure_access_cluster_endpoint="string",
secure_access_delay=float(0),
secure_access_enable="string",
secure_access_web=False,
tags=["string"],
target_name="string",
user_ttl="string")
const dynamicSecretEksResource = new akeyless.DynamicSecretEks("dynamicSecretEksResource", {
deleteProtection: "string",
description: "string",
dynamicSecretEksId: "string",
eksAccessKeyId: "string",
eksAssumeRole: "string",
eksClusterCaCert: "string",
eksClusterEndpoint: "string",
eksClusterName: "string",
eksRegion: "string",
eksSecretAccessKey: "string",
encryptionKeyName: "string",
itemCustomFields: {
string: "string",
},
name: "string",
secureAccessAllowPortForwading: false,
secureAccessCertificateIssuer: "string",
secureAccessClusterEndpoint: "string",
secureAccessDelay: 0,
secureAccessEnable: "string",
secureAccessWeb: false,
tags: ["string"],
targetName: "string",
userTtl: "string",
});
type: akeyless:DynamicSecretEks
properties:
deleteProtection: string
description: string
dynamicSecretEksId: string
eksAccessKeyId: string
eksAssumeRole: string
eksClusterCaCert: string
eksClusterEndpoint: string
eksClusterName: string
eksRegion: string
eksSecretAccessKey: string
encryptionKeyName: string
itemCustomFields:
string: string
name: string
secureAccessAllowPortForwading: false
secureAccessCertificateIssuer: string
secureAccessClusterEndpoint: string
secureAccessDelay: 0
secureAccessEnable: string
secureAccessWeb: false
tags:
- string
targetName: string
userTtl: string
DynamicSecretEks Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The DynamicSecretEks resource accepts the following input properties:
- Delete
Protection string - Protection from accidental deletion of this object [true/false]
- Description string
- Description of the object
- Dynamic
Secret stringEks Id - The ID of this resource.
- Eks
Access stringKey Id - EKS Access Key ID
- Eks
Assume stringRole - Role ARN. Role to assume when connecting to the EKS cluster
- Eks
Cluster stringCa Cert - EKS Cluster certificate. Base 64 encoded certificate.
- Eks
Cluster stringEndpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- Eks
Cluster stringName - EKS cluster name. Must match the EKS cluster name you want to connect to.
- Eks
Region string - EKS Region
- Eks
Secret stringAccess Key - EKS Secret Access Key
- Encryption
Key stringName - Encrypt dynamic secret details with following key
- Item
Custom Dictionary<string, string>Fields - Additional custom fields to associate with the item
- Name string
- Dynamic secret name
- Secure
Access boolAllow Port Forwading - Enable Port forwarding while using CLI access.
- Secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- Secure
Access stringCertificate Issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- Secure
Access stringCluster Endpoint - The K8s cluster endpoint URL
- Secure
Access doubleDelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- Secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- Secure
Access boolWeb - Enable Web Secure Remote Access
- List<string>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- Target
Name string - Name of existing target to use in dynamic secret creation
- User
Ttl string - User TTL
- Delete
Protection string - Protection from accidental deletion of this object [true/false]
- Description string
- Description of the object
- Dynamic
Secret stringEks Id - The ID of this resource.
- Eks
Access stringKey Id - EKS Access Key ID
- Eks
Assume stringRole - Role ARN. Role to assume when connecting to the EKS cluster
- Eks
Cluster stringCa Cert - EKS Cluster certificate. Base 64 encoded certificate.
- Eks
Cluster stringEndpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- Eks
Cluster stringName - EKS cluster name. Must match the EKS cluster name you want to connect to.
- Eks
Region string - EKS Region
- Eks
Secret stringAccess Key - EKS Secret Access Key
- Encryption
Key stringName - Encrypt dynamic secret details with following key
- Item
Custom map[string]stringFields - Additional custom fields to associate with the item
- Name string
- Dynamic secret name
- Secure
Access boolAllow Port Forwading - Enable Port forwarding while using CLI access.
- Secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- Secure
Access stringCertificate Issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- Secure
Access stringCluster Endpoint - The K8s cluster endpoint URL
- Secure
Access float64Delay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- Secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- Secure
Access boolWeb - Enable Web Secure Remote Access
- []string
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- Target
Name string - Name of existing target to use in dynamic secret creation
- User
Ttl string - User TTL
- delete_
protection string - Protection from accidental deletion of this object [true/false]
- description string
- Description of the object
- dynamic_
secret_ stringeks_ id - The ID of this resource.
- eks_
access_ stringkey_ id - EKS Access Key ID
- eks_
assume_ stringrole - Role ARN. Role to assume when connecting to the EKS cluster
- eks_
cluster_ stringca_ cert - EKS Cluster certificate. Base 64 encoded certificate.
- eks_
cluster_ stringendpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- eks_
cluster_ stringname - EKS cluster name. Must match the EKS cluster name you want to connect to.
- eks_
region string - EKS Region
- eks_
secret_ stringaccess_ key - EKS Secret Access Key
- encryption_
key_ stringname - Encrypt dynamic secret details with following key
- item_
custom_ map(string)fields - Additional custom fields to associate with the item
- name string
- Dynamic secret name
- secure_
access_ boolallow_ port_ forwading - Enable Port forwarding while using CLI access.
- secure_
access_ stringbastion_ issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure_
access_ stringcertificate_ issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- secure_
access_ stringcluster_ endpoint - The K8s cluster endpoint URL
- secure_
access_ numberdelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- secure_
access_ stringenable - Enable/Disable secure remote access, [true/false]
- secure_
access_ boolweb - Enable Web Secure Remote Access
- list(string)
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- target_
name string - Name of existing target to use in dynamic secret creation
- user_
ttl string - User TTL
- delete
Protection String - Protection from accidental deletion of this object [true/false]
- description String
- Description of the object
- dynamic
Secret StringEks Id - The ID of this resource.
- eks
Access StringKey Id - EKS Access Key ID
- eks
Assume StringRole - Role ARN. Role to assume when connecting to the EKS cluster
- eks
Cluster StringCa Cert - EKS Cluster certificate. Base 64 encoded certificate.
- eks
Cluster StringEndpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- eks
Cluster StringName - EKS cluster name. Must match the EKS cluster name you want to connect to.
- eks
Region String - EKS Region
- eks
Secret StringAccess Key - EKS Secret Access Key
- encryption
Key StringName - Encrypt dynamic secret details with following key
- item
Custom Map<String,String>Fields - Additional custom fields to associate with the item
- name String
- Dynamic secret name
- secure
Access BooleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access StringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access StringCertificate Issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- secure
Access StringCluster Endpoint - The K8s cluster endpoint URL
- secure
Access DoubleDelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- secure
Access StringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access BooleanWeb - Enable Web Secure Remote Access
- List<String>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- target
Name String - Name of existing target to use in dynamic secret creation
- user
Ttl String - User TTL
- delete
Protection string - Protection from accidental deletion of this object [true/false]
- description string
- Description of the object
- dynamic
Secret stringEks Id - The ID of this resource.
- eks
Access stringKey Id - EKS Access Key ID
- eks
Assume stringRole - Role ARN. Role to assume when connecting to the EKS cluster
- eks
Cluster stringCa Cert - EKS Cluster certificate. Base 64 encoded certificate.
- eks
Cluster stringEndpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- eks
Cluster stringName - EKS cluster name. Must match the EKS cluster name you want to connect to.
- eks
Region string - EKS Region
- eks
Secret stringAccess Key - EKS Secret Access Key
- encryption
Key stringName - Encrypt dynamic secret details with following key
- item
Custom {[key: string]: string}Fields - Additional custom fields to associate with the item
- name string
- Dynamic secret name
- secure
Access booleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access stringCertificate Issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- secure
Access stringCluster Endpoint - The K8s cluster endpoint URL
- secure
Access numberDelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access booleanWeb - Enable Web Secure Remote Access
- string[]
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- target
Name string - Name of existing target to use in dynamic secret creation
- user
Ttl string - User TTL
- delete_
protection str - Protection from accidental deletion of this object [true/false]
- description str
- Description of the object
- dynamic_
secret_ streks_ id - The ID of this resource.
- eks_
access_ strkey_ id - EKS Access Key ID
- eks_
assume_ strrole - Role ARN. Role to assume when connecting to the EKS cluster
- eks_
cluster_ strca_ cert - EKS Cluster certificate. Base 64 encoded certificate.
- eks_
cluster_ strendpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- eks_
cluster_ strname - EKS cluster name. Must match the EKS cluster name you want to connect to.
- eks_
region str - EKS Region
- eks_
secret_ straccess_ key - EKS Secret Access Key
- encryption_
key_ strname - Encrypt dynamic secret details with following key
- item_
custom_ Mapping[str, str]fields - Additional custom fields to associate with the item
- name str
- Dynamic secret name
- secure_
access_ boolallow_ port_ forwading - Enable Port forwarding while using CLI access.
- secure_
access_ strbastion_ issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure_
access_ strcertificate_ issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- secure_
access_ strcluster_ endpoint - The K8s cluster endpoint URL
- secure_
access_ floatdelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- secure_
access_ strenable - Enable/Disable secure remote access, [true/false]
- secure_
access_ boolweb - Enable Web Secure Remote Access
- Sequence[str]
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- target_
name str - Name of existing target to use in dynamic secret creation
- user_
ttl str - User TTL
- delete
Protection String - Protection from accidental deletion of this object [true/false]
- description String
- Description of the object
- dynamic
Secret StringEks Id - The ID of this resource.
- eks
Access StringKey Id - EKS Access Key ID
- eks
Assume StringRole - Role ARN. Role to assume when connecting to the EKS cluster
- eks
Cluster StringCa Cert - EKS Cluster certificate. Base 64 encoded certificate.
- eks
Cluster StringEndpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- eks
Cluster StringName - EKS cluster name. Must match the EKS cluster name you want to connect to.
- eks
Region String - EKS Region
- eks
Secret StringAccess Key - EKS Secret Access Key
- encryption
Key StringName - Encrypt dynamic secret details with following key
- item
Custom Map<String>Fields - Additional custom fields to associate with the item
- name String
- Dynamic secret name
- secure
Access BooleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access StringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access StringCertificate Issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- secure
Access StringCluster Endpoint - The K8s cluster endpoint URL
- secure
Access NumberDelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- secure
Access StringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access BooleanWeb - Enable Web Secure Remote Access
- List<String>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- target
Name String - Name of existing target to use in dynamic secret creation
- user
Ttl String - User TTL
Outputs
All input properties are implicitly available as output properties. Additionally, the DynamicSecretEks resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing DynamicSecretEks Resource
Get an existing DynamicSecretEks resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: DynamicSecretEksState, opts?: CustomResourceOptions): DynamicSecretEks@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
delete_protection: Optional[str] = None,
description: Optional[str] = None,
dynamic_secret_eks_id: Optional[str] = None,
eks_access_key_id: Optional[str] = None,
eks_assume_role: Optional[str] = None,
eks_cluster_ca_cert: Optional[str] = None,
eks_cluster_endpoint: Optional[str] = None,
eks_cluster_name: Optional[str] = None,
eks_region: Optional[str] = None,
eks_secret_access_key: Optional[str] = None,
encryption_key_name: Optional[str] = None,
item_custom_fields: Optional[Mapping[str, str]] = None,
name: Optional[str] = None,
secure_access_allow_port_forwading: Optional[bool] = None,
secure_access_bastion_issuer: Optional[str] = None,
secure_access_certificate_issuer: Optional[str] = None,
secure_access_cluster_endpoint: Optional[str] = None,
secure_access_delay: Optional[float] = None,
secure_access_enable: Optional[str] = None,
secure_access_web: Optional[bool] = None,
tags: Optional[Sequence[str]] = None,
target_name: Optional[str] = None,
user_ttl: Optional[str] = None) -> DynamicSecretEksfunc GetDynamicSecretEks(ctx *Context, name string, id IDInput, state *DynamicSecretEksState, opts ...ResourceOption) (*DynamicSecretEks, error)public static DynamicSecretEks Get(string name, Input<string> id, DynamicSecretEksState? state, CustomResourceOptions? opts = null)public static DynamicSecretEks get(String name, Output<String> id, DynamicSecretEksState state, CustomResourceOptions options)resources: _: type: akeyless:DynamicSecretEks get: id: ${id}import {
to = akeyless_dynamicsecreteks.example
id = "${id}"
}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Delete
Protection string - Protection from accidental deletion of this object [true/false]
- Description string
- Description of the object
- Dynamic
Secret stringEks Id - The ID of this resource.
- Eks
Access stringKey Id - EKS Access Key ID
- Eks
Assume stringRole - Role ARN. Role to assume when connecting to the EKS cluster
- Eks
Cluster stringCa Cert - EKS Cluster certificate. Base 64 encoded certificate.
- Eks
Cluster stringEndpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- Eks
Cluster stringName - EKS cluster name. Must match the EKS cluster name you want to connect to.
- Eks
Region string - EKS Region
- Eks
Secret stringAccess Key - EKS Secret Access Key
- Encryption
Key stringName - Encrypt dynamic secret details with following key
- Item
Custom Dictionary<string, string>Fields - Additional custom fields to associate with the item
- Name string
- Dynamic secret name
- Secure
Access boolAllow Port Forwading - Enable Port forwarding while using CLI access.
- Secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- Secure
Access stringCertificate Issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- Secure
Access stringCluster Endpoint - The K8s cluster endpoint URL
- Secure
Access doubleDelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- Secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- Secure
Access boolWeb - Enable Web Secure Remote Access
- List<string>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- Target
Name string - Name of existing target to use in dynamic secret creation
- User
Ttl string - User TTL
- Delete
Protection string - Protection from accidental deletion of this object [true/false]
- Description string
- Description of the object
- Dynamic
Secret stringEks Id - The ID of this resource.
- Eks
Access stringKey Id - EKS Access Key ID
- Eks
Assume stringRole - Role ARN. Role to assume when connecting to the EKS cluster
- Eks
Cluster stringCa Cert - EKS Cluster certificate. Base 64 encoded certificate.
- Eks
Cluster stringEndpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- Eks
Cluster stringName - EKS cluster name. Must match the EKS cluster name you want to connect to.
- Eks
Region string - EKS Region
- Eks
Secret stringAccess Key - EKS Secret Access Key
- Encryption
Key stringName - Encrypt dynamic secret details with following key
- Item
Custom map[string]stringFields - Additional custom fields to associate with the item
- Name string
- Dynamic secret name
- Secure
Access boolAllow Port Forwading - Enable Port forwarding while using CLI access.
- Secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- Secure
Access stringCertificate Issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- Secure
Access stringCluster Endpoint - The K8s cluster endpoint URL
- Secure
Access float64Delay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- Secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- Secure
Access boolWeb - Enable Web Secure Remote Access
- []string
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- Target
Name string - Name of existing target to use in dynamic secret creation
- User
Ttl string - User TTL
- delete_
protection string - Protection from accidental deletion of this object [true/false]
- description string
- Description of the object
- dynamic_
secret_ stringeks_ id - The ID of this resource.
- eks_
access_ stringkey_ id - EKS Access Key ID
- eks_
assume_ stringrole - Role ARN. Role to assume when connecting to the EKS cluster
- eks_
cluster_ stringca_ cert - EKS Cluster certificate. Base 64 encoded certificate.
- eks_
cluster_ stringendpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- eks_
cluster_ stringname - EKS cluster name. Must match the EKS cluster name you want to connect to.
- eks_
region string - EKS Region
- eks_
secret_ stringaccess_ key - EKS Secret Access Key
- encryption_
key_ stringname - Encrypt dynamic secret details with following key
- item_
custom_ map(string)fields - Additional custom fields to associate with the item
- name string
- Dynamic secret name
- secure_
access_ boolallow_ port_ forwading - Enable Port forwarding while using CLI access.
- secure_
access_ stringbastion_ issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure_
access_ stringcertificate_ issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- secure_
access_ stringcluster_ endpoint - The K8s cluster endpoint URL
- secure_
access_ numberdelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- secure_
access_ stringenable - Enable/Disable secure remote access, [true/false]
- secure_
access_ boolweb - Enable Web Secure Remote Access
- list(string)
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- target_
name string - Name of existing target to use in dynamic secret creation
- user_
ttl string - User TTL
- delete
Protection String - Protection from accidental deletion of this object [true/false]
- description String
- Description of the object
- dynamic
Secret StringEks Id - The ID of this resource.
- eks
Access StringKey Id - EKS Access Key ID
- eks
Assume StringRole - Role ARN. Role to assume when connecting to the EKS cluster
- eks
Cluster StringCa Cert - EKS Cluster certificate. Base 64 encoded certificate.
- eks
Cluster StringEndpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- eks
Cluster StringName - EKS cluster name. Must match the EKS cluster name you want to connect to.
- eks
Region String - EKS Region
- eks
Secret StringAccess Key - EKS Secret Access Key
- encryption
Key StringName - Encrypt dynamic secret details with following key
- item
Custom Map<String,String>Fields - Additional custom fields to associate with the item
- name String
- Dynamic secret name
- secure
Access BooleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access StringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access StringCertificate Issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- secure
Access StringCluster Endpoint - The K8s cluster endpoint URL
- secure
Access DoubleDelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- secure
Access StringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access BooleanWeb - Enable Web Secure Remote Access
- List<String>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- target
Name String - Name of existing target to use in dynamic secret creation
- user
Ttl String - User TTL
- delete
Protection string - Protection from accidental deletion of this object [true/false]
- description string
- Description of the object
- dynamic
Secret stringEks Id - The ID of this resource.
- eks
Access stringKey Id - EKS Access Key ID
- eks
Assume stringRole - Role ARN. Role to assume when connecting to the EKS cluster
- eks
Cluster stringCa Cert - EKS Cluster certificate. Base 64 encoded certificate.
- eks
Cluster stringEndpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- eks
Cluster stringName - EKS cluster name. Must match the EKS cluster name you want to connect to.
- eks
Region string - EKS Region
- eks
Secret stringAccess Key - EKS Secret Access Key
- encryption
Key stringName - Encrypt dynamic secret details with following key
- item
Custom {[key: string]: string}Fields - Additional custom fields to associate with the item
- name string
- Dynamic secret name
- secure
Access booleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access stringCertificate Issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- secure
Access stringCluster Endpoint - The K8s cluster endpoint URL
- secure
Access numberDelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access booleanWeb - Enable Web Secure Remote Access
- string[]
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- target
Name string - Name of existing target to use in dynamic secret creation
- user
Ttl string - User TTL
- delete_
protection str - Protection from accidental deletion of this object [true/false]
- description str
- Description of the object
- dynamic_
secret_ streks_ id - The ID of this resource.
- eks_
access_ strkey_ id - EKS Access Key ID
- eks_
assume_ strrole - Role ARN. Role to assume when connecting to the EKS cluster
- eks_
cluster_ strca_ cert - EKS Cluster certificate. Base 64 encoded certificate.
- eks_
cluster_ strendpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- eks_
cluster_ strname - EKS cluster name. Must match the EKS cluster name you want to connect to.
- eks_
region str - EKS Region
- eks_
secret_ straccess_ key - EKS Secret Access Key
- encryption_
key_ strname - Encrypt dynamic secret details with following key
- item_
custom_ Mapping[str, str]fields - Additional custom fields to associate with the item
- name str
- Dynamic secret name
- secure_
access_ boolallow_ port_ forwading - Enable Port forwarding while using CLI access.
- secure_
access_ strbastion_ issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure_
access_ strcertificate_ issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- secure_
access_ strcluster_ endpoint - The K8s cluster endpoint URL
- secure_
access_ floatdelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- secure_
access_ strenable - Enable/Disable secure remote access, [true/false]
- secure_
access_ boolweb - Enable Web Secure Remote Access
- Sequence[str]
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- target_
name str - Name of existing target to use in dynamic secret creation
- user_
ttl str - User TTL
- delete
Protection String - Protection from accidental deletion of this object [true/false]
- description String
- Description of the object
- dynamic
Secret StringEks Id - The ID of this resource.
- eks
Access StringKey Id - EKS Access Key ID
- eks
Assume StringRole - Role ARN. Role to assume when connecting to the EKS cluster
- eks
Cluster StringCa Cert - EKS Cluster certificate. Base 64 encoded certificate.
- eks
Cluster StringEndpoint - EKS Cluster endpoint. https:// , \n\n of the cluster.
- eks
Cluster StringName - EKS cluster name. Must match the EKS cluster name you want to connect to.
- eks
Region String - EKS Region
- eks
Secret StringAccess Key - EKS Secret Access Key
- encryption
Key StringName - Encrypt dynamic secret details with following key
- item
Custom Map<String>Fields - Additional custom fields to associate with the item
- name String
- Dynamic secret name
- secure
Access BooleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access StringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access StringCertificate Issuer - Path to the SSH Certificate Issuer for your Akeyless Secure Access
- secure
Access StringCluster Endpoint - The K8s cluster endpoint URL
- secure
Access NumberDelay - The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
- secure
Access StringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access BooleanWeb - Enable Web Secure Remote Access
- List<String>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
- target
Name String - Name of existing target to use in dynamic secret creation
- user
Ttl String - User TTL
Package Details
- Repository
- akeyless akeyless-community/terraform-provider-akeyless
- License
- Notes
- This Pulumi package is based on the
akeylessTerraform Provider.
published on Monday, Apr 27, 2026 by akeyless-community
