External Secrets Operator (ESO) synchronizes secrets from external providers (AWS Secrets Manager, HashiCorp Vault, Azure Key Vault, GCP Secret Manager, and more) into Kubernetes Secrets.Documentation Index
Fetch the complete documentation index at: https://radarhq.io/docs/llms.txt
Use this file to discover all available pages before exploring further.
What Radar Shows
ExternalSecret Detail View:- Sync status badge, last sync time, refresh interval
- Store reference with clickable link and kind indicator
- Secret mappings table (secret key → remote key, property, version)
- Data sources with type badges
- Target secret configuration and creation policies
- Sync failure detection (AlertBanner when Ready condition is False)
- Overview: provisioned vs failed namespace counts
- Namespace selection: explicit list or label selector
- Provisioned namespaces (green badges)
- Failed namespaces with per-namespace error details (AlertBanner)
- ExternalSecret spec: refresh interval, store reference, data/source counts
- Provider with color-coded badge (AWS orange, Azure/GCP blue, Vault purple, etc.)
- Provider-specific details: region, vault URL, project ID, authentication method
- Connection status with reason and last transition
- Retry settings
- Readiness detection (AlertBanner when not Ready)
Supported CRDs
| CRD | Group | Topology | Detail View | AI Summary |
|---|---|---|---|---|
| ExternalSecret | external-secrets.io/v1beta1 | - | Yes | - |
| ClusterExternalSecret | external-secrets.io/v1beta1 | - | Yes | - |
| SecretStore | external-secrets.io/v1beta1 | - | Yes | - |
| ClusterSecretStore | external-secrets.io/v1beta1 | - | Yes | - |