Overview
The External Secret Syncer (ESS) continuously syncs secrets and parameters from external providers into Control Plane secrets. This template deploys ESS as a workload that polls your configured providers on a set interval and creates or updates Control Plane secrets to match.How It Works
ESS runs as a workload on Control Plane. Your provider configuration and secrets list are stored in a Control Plane secret and mounted into the workload assync.yaml. On startup, ESS schedules a polling loop for each configured secret. At each interval, it fetches the latest value from the external provider and creates or updates the corresponding Control Plane secret via the API.
ESS tags every secret it manages with syncer.cpln.io/source (set to the workload path). This prevents two ESS instances from accidentally overwriting each other’s secrets. An hourly cleanup job also deletes any Control Plane secrets that ESS owns but that have been removed from your sync.yaml config.
ESS watches its config file and automatically restarts when changes are detected (every ~5 seconds). No workload restart is needed after updating the config secret.
Supported Providers
- AWS Systems Manager Parameter Store
- AWS Secrets Manager
- HashiCorp Vault
- GCP Secret Manager
- 1Password
- Doppler
What Gets Created
- Standard ESS Workload — An ESS container with a readiness probe on
/about. - Identity & Policy — An identity bound to the workload with
managepermissions on all secrets, allowing ESS to create and update Control Plane secrets. - Secret — An opaque secret containing the sync configuration (
sync.yaml) with providers and secret mappings.
This template does not create a GVC. You must deploy it into an existing GVC.
Prerequisites
- A secret or parameter stored in one of the supported providers.
- Credentials with read access to the desired secret (API token, IAM keys, etc.). Alternatively, you can use a cloud access identity instead of supplying keys directly.
Installation
To install, follow the instructions for your preferred method:UI
Browse, install, and manage templates visually
CLI
Manage templates from your terminal
Terraform
Declare templates in your Terraform configurations
Pulumi
Declare templates in your Pulumi programs
Configuration
The defaultvalues.yaml for this template:
Top-Level Fields
image— The ESS container image. Do not change unless upgrading.resources.cpu/resources.memory— Resource limits for the workload container.port— Port for the ESS HTTP admin API (default:3004). Used for health checks and manual sync triggers.allowedIp— List of CIDRs allowed to reach the ESS admin API externally. Replace the placeholder with your IP, or use0.0.0.0/0to allow all.essConfig— The full sync configuration — providers and secrets (see below).
Providers
Each entry inessConfig.providers defines a connection to an external secret store. Every provider must have a unique name. An optional syncInterval sets the default polling interval for all secrets using that provider.
| Provider | Required Fields |
|---|---|
| HashiCorp Vault | vault.address, vault.token |
| AWS Parameter Store | awsParameterStore.region |
| AWS Secrets Manager | awsSecretsManager.region |
| GCP Secret Manager | gcpSecretManager.projectId |
| 1Password | onePassword.serviceAccountToken |
| Doppler | doppler.accessToken |
accessKeyId and secretAccessKey. If omitted, ESS falls back to credentials provided through the workload’s cloud access identity.
GCP Secret Manager optionally accepts credentials.clientEmail and credentials.privateKey. If omitted, ESS uses Application Default Credentials.
Provider examples:
Secrets
Each entry inessConfig.secrets maps an external secret to a Control Plane secret. Each secret must specify a name, a provider, and exactly one sync type.
opaque — Single value
Creates a Control Plane opaque secret from a single fetched value.
Shorthand (path only):
Vault KV engine secrets are nested under a
data key. When using parse, start with data to access the secret content (e.g., data.password).If you use the shorthand form with no default, a fetch failure causes the sync to fail with no fallback.dictionary — Multiple values
Creates a Control Plane dictionary secret. Each key is fetched independently and supports path, parse, default, and encoding.
dictionaryFromProject — Entire Doppler project
Syncs all secrets from a Doppler project+config in one operation, stored as a Control Plane dictionary secret. Only valid with a Doppler provider.
Sync Interval
Intervals use the format<hours>h<minutes>m<seconds>s. All parts are optional but at least one is required. Examples: 10s, 5m, 1h, 1h30m, 1h30m10s.
Priority (highest wins):
- Secret-level
syncInterval - Provider-level
syncInterval - Global default (
300s)
Doppler Path Formats
| Sync type | Path format | Example |
|---|---|---|
opaque or dictionary key | project/config/SECRET_NAME | my-app/production/DATABASE_URL |
dictionaryFromProject | project/config | my-app/production |
Synced Secret Output
A secret created by ESS will look like:syncer.cpln.io/lastError tag is empty on success. If ESS encounters an error syncing a secret, the tag is populated with the error message.
Important Notes
- Conflict protection — If a Control Plane secret already exists and is managed by a different ESS instance, the sync for that secret will fail. Two ESS instances cannot manage the same secret.
- Secret type changes — Changing a secret from
opaquetodictionary(or vice versa) causes ESS to delete the existing secret and recreate it. There is a brief window where the secret does not exist. - Cleanup — ESS runs an hourly job that deletes Control Plane secrets it owns but that no longer appear in
sync.yaml. Removing a secret from the config will eventually result in its deletion from Control Plane. - Doppler
parse— Theparsefield only works when the Doppler secret’s value is JSON or YAML. Usingparseon a plain string secret throws an error. - Hot reload — ESS watches its config file and automatically restarts when changes are detected (every ~5 seconds). No workload restart is needed after updating the config secret.
External References
AWS Parameter Store
AWS Systems Manager Parameter Store documentation
AWS Secrets Manager
AWS Secrets Manager documentation
HashiCorp Vault
HashiCorp Vault secret management
GCP Secret Manager
Google Cloud Secret Manager documentation
1Password
1Password secret management
Doppler
Doppler secrets platform
ESS Image Source
Source code for the External Secret Syncer image
ESS Template
View the source files, default values, and chart definition