AWS Secrets Manager Sink
Provided by: "Apache Software Foundation"
Support Level for this Kamelet is: "Stable"
Create a secret in AWS Secrets Manager.
Access Key/Secret Key are the basic method for authenticating to the AWS Secrets Manager Service. These parameters are optional because the Kamelet provides the 'useDefaultCredentialsProvider'.
When using a default Credentials Provider the Secrets Manager client will load the credentials through this provider and won’t use the static credential. This is reason for not having the access key and secret key as mandatory parameter for this Kamelet.
The Kamelet expects the following headers to be set:
-
secret-name
/ce-secret-name
: as the secret name to create.
If the header won’t be set the exchange ID will be used as secret name.
Configuration Options
The following table summarizes the configuration options available for the aws-secrets-manager-sink
Kamelet:
Property | Name | Description | Type | Default | Example |
---|---|---|---|---|---|
AWS Region | Required The AWS region to access. Enum values: * ap-south-1 * eu-south-1 * us-gov-east-1 * me-central-1 * ca-central-1 * eu-central-1 * us-iso-west-1 * us-west-1 * us-west-2 * af-south-1 * eu-north-1 * eu-west-3 * eu-west-2 * eu-west-1 * ap-northeast-3 * ap-northeast-2 * ap-northeast-1 * me-south-1 * sa-east-1 * ap-east-1 * cn-north-1 * us-gov-west-1 * ap-southeast-1 * ap-southeast-2 * us-iso-east-1 * ap-southeast-3 * us-east-1 * us-east-2 * cn-northwest-1 * us-isob-east-1 * aws-global * aws-cn-global * aws-us-gov-global * aws-iso-global * aws-iso-b-global | string | |||
Access Key | The access key obtained from AWS. | string | |||
Secret Key | The secret key obtained from AWS. | string | |||
Default Credentials Provider | Set whether the Secrets Manager client should expect to load credentials through a default credentials provider or to expect static credentials to be passed in. | boolean | false |
Dependencies
At runtime, the aws-secrets-manager-sink
Kamelet relies upon the presence of the following dependencies:
-
camel:core
-
camel:aws-secrets-manager
-
camel:kamelet
Camel JBang usage
Prerequisites
-
You’ve installed JBang.
-
You have executed the following command:
jbang app install camel@apache/camel
Supposing you have a file named route.yaml with this content:
- route:
from:
uri: "kamelet:timer-source"
parameters:
period: 10000
message: 'test'
steps:
- to:
uri: "kamelet:log-sink"
You can now run it directly through the following command
camel run route.yaml
Camel K Environment Usage
This section describes how you can use the aws-secrets-manager-sink
.
Knative sink
You can use the aws-secrets-manager-sink
Kamelet as a Knative sink by binding it to a Knative object.
apiVersion: camel.apache.org/v1
kind: Pipe
metadata:
name: aws-secrets-manager-sink-pipe
spec:
source:
ref:
kind: Channel
apiVersion: messaging.knative.dev/v1
name: mychannel
sink:
ref:
kind: Kamelet
apiVersion: camel.apache.org/v1
name: aws-secrets-manager-sink
properties:
region: The AWS Region
Prerequisite
You have Camel K installed on the cluster.
Kafka sink
You can use the aws-secrets-manager-sink
Kamelet as a Kafka sink by binding it to a Kafka topic.
apiVersion: camel.apache.org/v1
kind: Pipe
metadata:
name: aws-secrets-manager-sink-pipe
spec:
source:
ref:
kind: KafkaTopic
apiVersion: kafka.strimzi.io/v1beta1
name: my-topic
sink:
ref:
kind: Kamelet
apiVersion: camel.apache.org/v1
name: aws-secrets-manager-sink
properties:
region: The AWS Region
Prerequisites
-
You’ve installed Strimzi.
-
You’ve created a topic named
my-topic
in the current namespace. -
You have Camel K installed on the cluster.