akeyless.DynamicSecretK8s
Explore with Pulumi AI
Native Kubernetes Service dynamic secret resource
Create DynamicSecretK8s Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new DynamicSecretK8s(name: string, args?: DynamicSecretK8sArgs, opts?: CustomResourceOptions);
@overload
def DynamicSecretK8s(resource_name: str,
args: Optional[DynamicSecretK8sArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def DynamicSecretK8s(resource_name: str,
opts: Optional[ResourceOptions] = None,
delete_protection: Optional[str] = None,
dynamic_secret_k8s_id: Optional[str] = None,
encryption_key_name: Optional[str] = None,
k8s_allowed_namespaces: Optional[str] = None,
k8s_cluster_ca_cert: Optional[str] = None,
k8s_cluster_endpoint: Optional[str] = None,
k8s_cluster_token: Optional[str] = None,
k8s_namespace: Optional[str] = None,
k8s_predefined_role_name: Optional[str] = None,
k8s_predefined_role_type: Optional[str] = None,
k8s_service_account: Optional[str] = None,
k8s_service_account_type: Optional[str] = None,
name: Optional[str] = None,
secure_access_allow_port_forwading: Optional[bool] = None,
secure_access_bastion_issuer: Optional[str] = None,
secure_access_cluster_endpoint: Optional[str] = None,
secure_access_dashboard_url: Optional[str] = None,
secure_access_enable: Optional[str] = None,
secure_access_web: Optional[bool] = None,
secure_access_web_browsing: Optional[bool] = None,
secure_access_web_proxy: Optional[bool] = None,
tags: Optional[Sequence[str]] = None,
target_name: Optional[str] = None,
user_ttl: Optional[str] = None)
func NewDynamicSecretK8s(ctx *Context, name string, args *DynamicSecretK8sArgs, opts ...ResourceOption) (*DynamicSecretK8s, error)
public DynamicSecretK8s(string name, DynamicSecretK8sArgs? args = null, CustomResourceOptions? opts = null)
public DynamicSecretK8s(String name, DynamicSecretK8sArgs args)
public DynamicSecretK8s(String name, DynamicSecretK8sArgs args, CustomResourceOptions options)
type: akeyless:DynamicSecretK8s
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args DynamicSecretK8sArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args DynamicSecretK8sArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args DynamicSecretK8sArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args DynamicSecretK8sArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args DynamicSecretK8sArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var dynamicSecretK8sResource = new Akeyless.DynamicSecretK8s("dynamicSecretK8sResource", new()
{
DeleteProtection = "string",
DynamicSecretK8sId = "string",
EncryptionKeyName = "string",
K8sAllowedNamespaces = "string",
K8sClusterCaCert = "string",
K8sClusterEndpoint = "string",
K8sClusterToken = "string",
K8sNamespace = "string",
K8sPredefinedRoleName = "string",
K8sPredefinedRoleType = "string",
K8sServiceAccount = "string",
K8sServiceAccountType = "string",
Name = "string",
SecureAccessAllowPortForwading = false,
SecureAccessBastionIssuer = "string",
SecureAccessClusterEndpoint = "string",
SecureAccessDashboardUrl = "string",
SecureAccessEnable = "string",
SecureAccessWeb = false,
SecureAccessWebBrowsing = false,
SecureAccessWebProxy = false,
Tags = new[]
{
"string",
},
TargetName = "string",
UserTtl = "string",
});
example, err := akeyless.NewDynamicSecretK8s(ctx, "dynamicSecretK8sResource", &akeyless.DynamicSecretK8sArgs{
DeleteProtection: pulumi.String("string"),
DynamicSecretK8sId: pulumi.String("string"),
EncryptionKeyName: pulumi.String("string"),
K8sAllowedNamespaces: pulumi.String("string"),
K8sClusterCaCert: pulumi.String("string"),
K8sClusterEndpoint: pulumi.String("string"),
K8sClusterToken: pulumi.String("string"),
K8sNamespace: pulumi.String("string"),
K8sPredefinedRoleName: pulumi.String("string"),
K8sPredefinedRoleType: pulumi.String("string"),
K8sServiceAccount: pulumi.String("string"),
K8sServiceAccountType: pulumi.String("string"),
Name: pulumi.String("string"),
SecureAccessAllowPortForwading: pulumi.Bool(false),
SecureAccessBastionIssuer: pulumi.String("string"),
SecureAccessClusterEndpoint: pulumi.String("string"),
SecureAccessDashboardUrl: pulumi.String("string"),
SecureAccessEnable: pulumi.String("string"),
SecureAccessWeb: pulumi.Bool(false),
SecureAccessWebBrowsing: pulumi.Bool(false),
SecureAccessWebProxy: pulumi.Bool(false),
Tags: pulumi.StringArray{
pulumi.String("string"),
},
TargetName: pulumi.String("string"),
UserTtl: pulumi.String("string"),
})
var dynamicSecretK8sResource = new DynamicSecretK8s("dynamicSecretK8sResource", DynamicSecretK8sArgs.builder()
.deleteProtection("string")
.dynamicSecretK8sId("string")
.encryptionKeyName("string")
.k8sAllowedNamespaces("string")
.k8sClusterCaCert("string")
.k8sClusterEndpoint("string")
.k8sClusterToken("string")
.k8sNamespace("string")
.k8sPredefinedRoleName("string")
.k8sPredefinedRoleType("string")
.k8sServiceAccount("string")
.k8sServiceAccountType("string")
.name("string")
.secureAccessAllowPortForwading(false)
.secureAccessBastionIssuer("string")
.secureAccessClusterEndpoint("string")
.secureAccessDashboardUrl("string")
.secureAccessEnable("string")
.secureAccessWeb(false)
.secureAccessWebBrowsing(false)
.secureAccessWebProxy(false)
.tags("string")
.targetName("string")
.userTtl("string")
.build());
dynamic_secret_k8s_resource = akeyless.DynamicSecretK8s("dynamicSecretK8sResource",
delete_protection="string",
dynamic_secret_k8s_id="string",
encryption_key_name="string",
k8s_allowed_namespaces="string",
k8s_cluster_ca_cert="string",
k8s_cluster_endpoint="string",
k8s_cluster_token="string",
k8s_namespace="string",
k8s_predefined_role_name="string",
k8s_predefined_role_type="string",
k8s_service_account="string",
k8s_service_account_type="string",
name="string",
secure_access_allow_port_forwading=False,
secure_access_bastion_issuer="string",
secure_access_cluster_endpoint="string",
secure_access_dashboard_url="string",
secure_access_enable="string",
secure_access_web=False,
secure_access_web_browsing=False,
secure_access_web_proxy=False,
tags=["string"],
target_name="string",
user_ttl="string")
const dynamicSecretK8sResource = new akeyless.DynamicSecretK8s("dynamicSecretK8sResource", {
deleteProtection: "string",
dynamicSecretK8sId: "string",
encryptionKeyName: "string",
k8sAllowedNamespaces: "string",
k8sClusterCaCert: "string",
k8sClusterEndpoint: "string",
k8sClusterToken: "string",
k8sNamespace: "string",
k8sPredefinedRoleName: "string",
k8sPredefinedRoleType: "string",
k8sServiceAccount: "string",
k8sServiceAccountType: "string",
name: "string",
secureAccessAllowPortForwading: false,
secureAccessBastionIssuer: "string",
secureAccessClusterEndpoint: "string",
secureAccessDashboardUrl: "string",
secureAccessEnable: "string",
secureAccessWeb: false,
secureAccessWebBrowsing: false,
secureAccessWebProxy: false,
tags: ["string"],
targetName: "string",
userTtl: "string",
});
type: akeyless:DynamicSecretK8s
properties:
deleteProtection: string
dynamicSecretK8sId: string
encryptionKeyName: string
k8sAllowedNamespaces: string
k8sClusterCaCert: string
k8sClusterEndpoint: string
k8sClusterToken: string
k8sNamespace: string
k8sPredefinedRoleName: string
k8sPredefinedRoleType: string
k8sServiceAccount: string
k8sServiceAccountType: string
name: string
secureAccessAllowPortForwading: false
secureAccessBastionIssuer: string
secureAccessClusterEndpoint: string
secureAccessDashboardUrl: string
secureAccessEnable: string
secureAccessWeb: false
secureAccessWebBrowsing: false
secureAccessWebProxy: false
tags:
- string
targetName: string
userTtl: string
DynamicSecretK8s Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The DynamicSecretK8s resource accepts the following input properties:
- Delete
Protection string - Protection from accidental deletion of this item [true/false]
- Dynamic
Secret stringK8s Id - The ID of this resource.
- Encryption
Key stringName - Encrypt dynamic secret details with following key
- K8s
Allowed stringNamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- K8s
Cluster stringCa Cert - K8S Cluster certificate. Base 64 encoded certificate.
- K8s
Cluster stringEndpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- K8s
Cluster stringToken - K8S Cluster authentication token.
- K8s
Namespace string - K8S Namespace where the ServiceAccount exists.
- K8s
Predefined stringRole Name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- K8s
Predefined stringRole Type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- K8s
Service stringAccount - K8S ServiceAccount to extract token from.
- K8s
Service stringAccount Type - K8S ServiceAccount type [fixed, dynamic].
- Name string
- Dynamic secret name
- Secure
Access boolAllow Port Forwading - Enable Port forwarding while using CLI access.
- Secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- Secure
Access stringCluster Endpoint - The K8s cluster endpoint
- Secure
Access stringDashboard Url - The K8s dashboard url
- Secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- Secure
Access boolWeb - Enable Web Secure Remote Access
- Secure
Access boolWeb Browsing - Secure browser via Akeyless Web Access Bastion
- Secure
Access boolWeb Proxy - Web-Proxy via Akeyless Web Access Bastion
- List<string>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- Target
Name string - Name of existing target to use in dynamic secret creation
- User
Ttl string - User TTL
- Delete
Protection string - Protection from accidental deletion of this item [true/false]
- Dynamic
Secret stringK8s Id - The ID of this resource.
- Encryption
Key stringName - Encrypt dynamic secret details with following key
- K8s
Allowed stringNamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- K8s
Cluster stringCa Cert - K8S Cluster certificate. Base 64 encoded certificate.
- K8s
Cluster stringEndpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- K8s
Cluster stringToken - K8S Cluster authentication token.
- K8s
Namespace string - K8S Namespace where the ServiceAccount exists.
- K8s
Predefined stringRole Name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- K8s
Predefined stringRole Type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- K8s
Service stringAccount - K8S ServiceAccount to extract token from.
- K8s
Service stringAccount Type - K8S ServiceAccount type [fixed, dynamic].
- Name string
- Dynamic secret name
- Secure
Access boolAllow Port Forwading - Enable Port forwarding while using CLI access.
- Secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- Secure
Access stringCluster Endpoint - The K8s cluster endpoint
- Secure
Access stringDashboard Url - The K8s dashboard url
- Secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- Secure
Access boolWeb - Enable Web Secure Remote Access
- Secure
Access boolWeb Browsing - Secure browser via Akeyless Web Access Bastion
- Secure
Access boolWeb Proxy - Web-Proxy via Akeyless Web Access Bastion
- []string
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- Target
Name string - Name of existing target to use in dynamic secret creation
- User
Ttl string - User TTL
- delete
Protection String - Protection from accidental deletion of this item [true/false]
- dynamic
Secret StringK8s Id - The ID of this resource.
- encryption
Key StringName - Encrypt dynamic secret details with following key
- k8s
Allowed StringNamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- k8s
Cluster StringCa Cert - K8S Cluster certificate. Base 64 encoded certificate.
- k8s
Cluster StringEndpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- k8s
Cluster StringToken - K8S Cluster authentication token.
- k8s
Namespace String - K8S Namespace where the ServiceAccount exists.
- k8s
Predefined StringRole Name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- k8s
Predefined StringRole Type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- k8s
Service StringAccount - K8S ServiceAccount to extract token from.
- k8s
Service StringAccount Type - K8S ServiceAccount type [fixed, dynamic].
- name String
- Dynamic secret name
- secure
Access BooleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access StringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access StringCluster Endpoint - The K8s cluster endpoint
- secure
Access StringDashboard Url - The K8s dashboard url
- secure
Access StringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access BooleanWeb - Enable Web Secure Remote Access
- secure
Access BooleanWeb Browsing - Secure browser via Akeyless Web Access Bastion
- secure
Access BooleanWeb Proxy - Web-Proxy via Akeyless Web Access Bastion
- List<String>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- target
Name String - Name of existing target to use in dynamic secret creation
- user
Ttl String - User TTL
- delete
Protection string - Protection from accidental deletion of this item [true/false]
- dynamic
Secret stringK8s Id - The ID of this resource.
- encryption
Key stringName - Encrypt dynamic secret details with following key
- k8s
Allowed stringNamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- k8s
Cluster stringCa Cert - K8S Cluster certificate. Base 64 encoded certificate.
- k8s
Cluster stringEndpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- k8s
Cluster stringToken - K8S Cluster authentication token.
- k8s
Namespace string - K8S Namespace where the ServiceAccount exists.
- k8s
Predefined stringRole Name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- k8s
Predefined stringRole Type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- k8s
Service stringAccount - K8S ServiceAccount to extract token from.
- k8s
Service stringAccount Type - K8S ServiceAccount type [fixed, dynamic].
- name string
- Dynamic secret name
- secure
Access booleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access stringCluster Endpoint - The K8s cluster endpoint
- secure
Access stringDashboard Url - The K8s dashboard url
- secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access booleanWeb - Enable Web Secure Remote Access
- secure
Access booleanWeb Browsing - Secure browser via Akeyless Web Access Bastion
- secure
Access booleanWeb Proxy - Web-Proxy via Akeyless Web Access Bastion
- string[]
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- target
Name string - Name of existing target to use in dynamic secret creation
- user
Ttl string - User TTL
- delete_
protection str - Protection from accidental deletion of this item [true/false]
- dynamic_
secret_ strk8s_ id - The ID of this resource.
- encryption_
key_ strname - Encrypt dynamic secret details with following key
- k8s_
allowed_ strnamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- k8s_
cluster_ strca_ cert - K8S Cluster certificate. Base 64 encoded certificate.
- k8s_
cluster_ strendpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- k8s_
cluster_ strtoken - K8S Cluster authentication token.
- k8s_
namespace str - K8S Namespace where the ServiceAccount exists.
- k8s_
predefined_ strrole_ name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- k8s_
predefined_ strrole_ type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- k8s_
service_ straccount - K8S ServiceAccount to extract token from.
- k8s_
service_ straccount_ type - K8S ServiceAccount type [fixed, dynamic].
- name str
- Dynamic secret name
- secure_
access_ boolallow_ port_ forwading - Enable Port forwarding while using CLI access.
- secure_
access_ strbastion_ issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure_
access_ strcluster_ endpoint - The K8s cluster endpoint
- secure_
access_ strdashboard_ url - The K8s dashboard url
- secure_
access_ strenable - Enable/Disable secure remote access, [true/false]
- secure_
access_ boolweb - Enable Web Secure Remote Access
- secure_
access_ boolweb_ browsing - Secure browser via Akeyless Web Access Bastion
- secure_
access_ boolweb_ proxy - Web-Proxy via Akeyless Web Access Bastion
- Sequence[str]
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- target_
name str - Name of existing target to use in dynamic secret creation
- user_
ttl str - User TTL
- delete
Protection String - Protection from accidental deletion of this item [true/false]
- dynamic
Secret StringK8s Id - The ID of this resource.
- encryption
Key StringName - Encrypt dynamic secret details with following key
- k8s
Allowed StringNamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- k8s
Cluster StringCa Cert - K8S Cluster certificate. Base 64 encoded certificate.
- k8s
Cluster StringEndpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- k8s
Cluster StringToken - K8S Cluster authentication token.
- k8s
Namespace String - K8S Namespace where the ServiceAccount exists.
- k8s
Predefined StringRole Name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- k8s
Predefined StringRole Type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- k8s
Service StringAccount - K8S ServiceAccount to extract token from.
- k8s
Service StringAccount Type - K8S ServiceAccount type [fixed, dynamic].
- name String
- Dynamic secret name
- secure
Access BooleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access StringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access StringCluster Endpoint - The K8s cluster endpoint
- secure
Access StringDashboard Url - The K8s dashboard url
- secure
Access StringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access BooleanWeb - Enable Web Secure Remote Access
- secure
Access BooleanWeb Browsing - Secure browser via Akeyless Web Access Bastion
- secure
Access BooleanWeb Proxy - Web-Proxy via Akeyless Web Access Bastion
- List<String>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- target
Name String - Name of existing target to use in dynamic secret creation
- user
Ttl String - User TTL
Outputs
All input properties are implicitly available as output properties. Additionally, the DynamicSecretK8s resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing DynamicSecretK8s Resource
Get an existing DynamicSecretK8s resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: DynamicSecretK8sState, opts?: CustomResourceOptions): DynamicSecretK8s
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
delete_protection: Optional[str] = None,
dynamic_secret_k8s_id: Optional[str] = None,
encryption_key_name: Optional[str] = None,
k8s_allowed_namespaces: Optional[str] = None,
k8s_cluster_ca_cert: Optional[str] = None,
k8s_cluster_endpoint: Optional[str] = None,
k8s_cluster_token: Optional[str] = None,
k8s_namespace: Optional[str] = None,
k8s_predefined_role_name: Optional[str] = None,
k8s_predefined_role_type: Optional[str] = None,
k8s_service_account: Optional[str] = None,
k8s_service_account_type: Optional[str] = None,
name: Optional[str] = None,
secure_access_allow_port_forwading: Optional[bool] = None,
secure_access_bastion_issuer: Optional[str] = None,
secure_access_cluster_endpoint: Optional[str] = None,
secure_access_dashboard_url: Optional[str] = None,
secure_access_enable: Optional[str] = None,
secure_access_web: Optional[bool] = None,
secure_access_web_browsing: Optional[bool] = None,
secure_access_web_proxy: Optional[bool] = None,
tags: Optional[Sequence[str]] = None,
target_name: Optional[str] = None,
user_ttl: Optional[str] = None) -> DynamicSecretK8s
func GetDynamicSecretK8s(ctx *Context, name string, id IDInput, state *DynamicSecretK8sState, opts ...ResourceOption) (*DynamicSecretK8s, error)
public static DynamicSecretK8s Get(string name, Input<string> id, DynamicSecretK8sState? state, CustomResourceOptions? opts = null)
public static DynamicSecretK8s get(String name, Output<String> id, DynamicSecretK8sState state, CustomResourceOptions options)
resources: _: type: akeyless:DynamicSecretK8s get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Delete
Protection string - Protection from accidental deletion of this item [true/false]
- Dynamic
Secret stringK8s Id - The ID of this resource.
- Encryption
Key stringName - Encrypt dynamic secret details with following key
- K8s
Allowed stringNamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- K8s
Cluster stringCa Cert - K8S Cluster certificate. Base 64 encoded certificate.
- K8s
Cluster stringEndpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- K8s
Cluster stringToken - K8S Cluster authentication token.
- K8s
Namespace string - K8S Namespace where the ServiceAccount exists.
- K8s
Predefined stringRole Name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- K8s
Predefined stringRole Type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- K8s
Service stringAccount - K8S ServiceAccount to extract token from.
- K8s
Service stringAccount Type - K8S ServiceAccount type [fixed, dynamic].
- Name string
- Dynamic secret name
- Secure
Access boolAllow Port Forwading - Enable Port forwarding while using CLI access.
- Secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- Secure
Access stringCluster Endpoint - The K8s cluster endpoint
- Secure
Access stringDashboard Url - The K8s dashboard url
- Secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- Secure
Access boolWeb - Enable Web Secure Remote Access
- Secure
Access boolWeb Browsing - Secure browser via Akeyless Web Access Bastion
- Secure
Access boolWeb Proxy - Web-Proxy via Akeyless Web Access Bastion
- List<string>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- Target
Name string - Name of existing target to use in dynamic secret creation
- User
Ttl string - User TTL
- Delete
Protection string - Protection from accidental deletion of this item [true/false]
- Dynamic
Secret stringK8s Id - The ID of this resource.
- Encryption
Key stringName - Encrypt dynamic secret details with following key
- K8s
Allowed stringNamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- K8s
Cluster stringCa Cert - K8S Cluster certificate. Base 64 encoded certificate.
- K8s
Cluster stringEndpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- K8s
Cluster stringToken - K8S Cluster authentication token.
- K8s
Namespace string - K8S Namespace where the ServiceAccount exists.
- K8s
Predefined stringRole Name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- K8s
Predefined stringRole Type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- K8s
Service stringAccount - K8S ServiceAccount to extract token from.
- K8s
Service stringAccount Type - K8S ServiceAccount type [fixed, dynamic].
- Name string
- Dynamic secret name
- Secure
Access boolAllow Port Forwading - Enable Port forwarding while using CLI access.
- Secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- Secure
Access stringCluster Endpoint - The K8s cluster endpoint
- Secure
Access stringDashboard Url - The K8s dashboard url
- Secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- Secure
Access boolWeb - Enable Web Secure Remote Access
- Secure
Access boolWeb Browsing - Secure browser via Akeyless Web Access Bastion
- Secure
Access boolWeb Proxy - Web-Proxy via Akeyless Web Access Bastion
- []string
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- Target
Name string - Name of existing target to use in dynamic secret creation
- User
Ttl string - User TTL
- delete
Protection String - Protection from accidental deletion of this item [true/false]
- dynamic
Secret StringK8s Id - The ID of this resource.
- encryption
Key StringName - Encrypt dynamic secret details with following key
- k8s
Allowed StringNamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- k8s
Cluster StringCa Cert - K8S Cluster certificate. Base 64 encoded certificate.
- k8s
Cluster StringEndpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- k8s
Cluster StringToken - K8S Cluster authentication token.
- k8s
Namespace String - K8S Namespace where the ServiceAccount exists.
- k8s
Predefined StringRole Name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- k8s
Predefined StringRole Type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- k8s
Service StringAccount - K8S ServiceAccount to extract token from.
- k8s
Service StringAccount Type - K8S ServiceAccount type [fixed, dynamic].
- name String
- Dynamic secret name
- secure
Access BooleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access StringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access StringCluster Endpoint - The K8s cluster endpoint
- secure
Access StringDashboard Url - The K8s dashboard url
- secure
Access StringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access BooleanWeb - Enable Web Secure Remote Access
- secure
Access BooleanWeb Browsing - Secure browser via Akeyless Web Access Bastion
- secure
Access BooleanWeb Proxy - Web-Proxy via Akeyless Web Access Bastion
- List<String>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- target
Name String - Name of existing target to use in dynamic secret creation
- user
Ttl String - User TTL
- delete
Protection string - Protection from accidental deletion of this item [true/false]
- dynamic
Secret stringK8s Id - The ID of this resource.
- encryption
Key stringName - Encrypt dynamic secret details with following key
- k8s
Allowed stringNamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- k8s
Cluster stringCa Cert - K8S Cluster certificate. Base 64 encoded certificate.
- k8s
Cluster stringEndpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- k8s
Cluster stringToken - K8S Cluster authentication token.
- k8s
Namespace string - K8S Namespace where the ServiceAccount exists.
- k8s
Predefined stringRole Name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- k8s
Predefined stringRole Type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- k8s
Service stringAccount - K8S ServiceAccount to extract token from.
- k8s
Service stringAccount Type - K8S ServiceAccount type [fixed, dynamic].
- name string
- Dynamic secret name
- secure
Access booleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access stringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access stringCluster Endpoint - The K8s cluster endpoint
- secure
Access stringDashboard Url - The K8s dashboard url
- secure
Access stringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access booleanWeb - Enable Web Secure Remote Access
- secure
Access booleanWeb Browsing - Secure browser via Akeyless Web Access Bastion
- secure
Access booleanWeb Proxy - Web-Proxy via Akeyless Web Access Bastion
- string[]
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- target
Name string - Name of existing target to use in dynamic secret creation
- user
Ttl string - User TTL
- delete_
protection str - Protection from accidental deletion of this item [true/false]
- dynamic_
secret_ strk8s_ id - The ID of this resource.
- encryption_
key_ strname - Encrypt dynamic secret details with following key
- k8s_
allowed_ strnamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- k8s_
cluster_ strca_ cert - K8S Cluster certificate. Base 64 encoded certificate.
- k8s_
cluster_ strendpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- k8s_
cluster_ strtoken - K8S Cluster authentication token.
- k8s_
namespace str - K8S Namespace where the ServiceAccount exists.
- k8s_
predefined_ strrole_ name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- k8s_
predefined_ strrole_ type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- k8s_
service_ straccount - K8S ServiceAccount to extract token from.
- k8s_
service_ straccount_ type - K8S ServiceAccount type [fixed, dynamic].
- name str
- Dynamic secret name
- secure_
access_ boolallow_ port_ forwading - Enable Port forwarding while using CLI access.
- secure_
access_ strbastion_ issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure_
access_ strcluster_ endpoint - The K8s cluster endpoint
- secure_
access_ strdashboard_ url - The K8s dashboard url
- secure_
access_ strenable - Enable/Disable secure remote access, [true/false]
- secure_
access_ boolweb - Enable Web Secure Remote Access
- secure_
access_ boolweb_ browsing - Secure browser via Akeyless Web Access Bastion
- secure_
access_ boolweb_ proxy - Web-Proxy via Akeyless Web Access Bastion
- Sequence[str]
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- target_
name str - Name of existing target to use in dynamic secret creation
- user_
ttl str - User TTL
- delete
Protection String - Protection from accidental deletion of this item [true/false]
- dynamic
Secret StringK8s Id - The ID of this resource.
- encryption
Key StringName - Encrypt dynamic secret details with following key
- k8s
Allowed StringNamespaces - Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).
- k8s
Cluster StringCa Cert - K8S Cluster certificate. Base 64 encoded certificate.
- k8s
Cluster StringEndpoint - K8S Cluster endpoint. https:// , \n\n of the cluster.
- k8s
Cluster StringToken - K8S Cluster authentication token.
- k8s
Namespace String - K8S Namespace where the ServiceAccount exists.
- k8s
Predefined StringRole Name - The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).
- k8s
Predefined StringRole Type - Specifies the type of the pre-existing K8S role Role, ClusterRole.
- k8s
Service StringAccount - K8S ServiceAccount to extract token from.
- k8s
Service StringAccount Type - K8S ServiceAccount type [fixed, dynamic].
- name String
- Dynamic secret name
- secure
Access BooleanAllow Port Forwading - Enable Port forwarding while using CLI access.
- secure
Access StringBastion Issuer - Path to the SSH Certificate Issuer for your Akeyless Bastion
- secure
Access StringCluster Endpoint - The K8s cluster endpoint
- secure
Access StringDashboard Url - The K8s dashboard url
- secure
Access StringEnable - Enable/Disable secure remote access, [true/false]
- secure
Access BooleanWeb - Enable Web Secure Remote Access
- secure
Access BooleanWeb Browsing - Secure browser via Akeyless Web Access Bastion
- secure
Access BooleanWeb Proxy - Web-Proxy via Akeyless Web Access Bastion
- List<String>
- List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2
- target
Name String - Name of existing target to use in dynamic secret creation
- user
Ttl String - User TTL
Package Details
- Repository
- akeyless akeyless-community/terraform-provider-akeyless
- License
- Notes
- This Pulumi package is based on the
akeyless
Terraform Provider.