Skip to content

Amazon EKS Cluster w/ External Secrets Operator

This pattern deploys an EKS Cluster with the External Secrets Operator. The cluster is populated with a ClusterSecretStore and SecretStore example using SecretManager and Parameter Store respectively. A secret for each store is also created. Both stores use IRSA to retrieve the secret values from AWS.


See here for the prerequisites and steps to deploy this pattern.


  1. List the secret resources in the external-secrets namespace

    kubectl get externalsecrets -n external-secrets
    kubectl get secrets -n external-secrets


terraform destroy -target="module.eks_blueprints_addons" -auto-approve
terraform destroy -target="module.eks" -auto-approve
terraform destroy -auto-approve

See here for more details on cleaning up the resources created.