0

I'm using spring cloud AWS secrets manager support to load in configuration defined by terraform which creates the application secret defaults.

Once adding a policy statement to the services accessing the secret I run into spring not starting as it's attempting to read all kinds of secrets for profiles that do not exist in secrets manager.

How can I restrict the spring cloud secrets manager support to only read secrets I have explicitly granted access without needing to create empty secrets for every profile?

Brett Ryan
  • 26,937
  • 30
  • 128
  • 163

1 Answers1

0

This is not possible yet unfortunately. We have pull request that enables skipping loading profiles that will likely be merged in 2.3 and we are re-thinking Secrets Manager integration for 3.0.

Maciej Walkowiak
  • 12,372
  • 59
  • 63