How to set up the AWS SQS notification source for your environment and rotate secrets
ExternalSecret
destination, external-secrets operator needs to be installedkind
cluster for a quick onboarding experience. If you intend to use service accounts with IRSA enabled, you’ll need an EKS cluster with an associated OIDC provider.authMethod
: credentials
secretRef
: References to Kubernetes Secrets containing AWS credentials:
accessKeyIDSecretRef
: Reference to the AWS Access Key ID.secretAccessKeySecretRef
: Reference to the AWS Secret Access Key.sessionTokenSecretRef
: (Optional) Reference to the AWS session token for temporary credentials.serviceAccount
auth method, then IAM Roles for Service Accounts (IRSA) needs to be set up. IRSA allows you to associate an AWS IAM role with a Kubernetes ServiceAccount, enabling the pod to access AWS resources securely using OpenID Connect (OIDC).
eventName
and requestParameters.secretId
fields in the message payload to identify which secret has changed.
maxNumberOfMessages
: (Optional) The maximum number of messages to retrieve from the SQS queue in a single request. Adjust based on your application’s throughput requirements.waitTimeSeconds
: (Optional) The duration (in seconds) to wait for messages if the queue is empty. Increasing this value can reduce the number of empty responses when polling.visibilityTimeout
: (Optional) The duration (in seconds) that a received message is hidden from other consumers. Set this value based on how long it takes to process a message.