Accessing the Yandex Cloud API from a Managed Service for Kubernetes cluster using a workload identity federation in Identity and Access Management
- Get your cloud ready
- Set up a Managed Service for Kubernetes cluster
- Create a workload identity federation
- Set up an IAM service account
- Set up an Kubernetes service account
- Link the IAM service account to the federation
- Create a Yandex Lockbox secret
- Test the integration
- How to delete the resources you created
Managed Service for Kubernetes supports integration with Identity and Access Management workload identity federations.
Workload identity federations allow you to configure a link between external systems and Yandex Cloud via the OpenID Connect
When this option is enabled, Managed Service for Kubernetes automatically creates an OIDC provider for the specific cluster and provides the following parameters for integration with workload identity federations:
Issuer URL.JWKS key set URL.
Warning
Full integration with a workload identity federation via the yc-metadata-server DaemonSet controller on nodes for automatic exchange of Kubernetes service account tokens for an IAM token is available for clusters with a current Kubernetes version in the RAPID release channel.
Partial integration with manual exchange of Kubernetes service account tokens for an IAM token is available for clusters with all current Kubernetes versions in all release channels.
This tutorial exemplifies getting the value of a Yandex Lockbox secret from a Managed Service for Kubernetes using an Identity and Access Management service account.
Similarly, you can perform any action via the Yandex Cloud CLI, Terraform, an SDK, or the API.
Note
This tutorial demonstrates an example of integrating a Managed Service for Kubernetes cluster with a workload identity federation. For a tutorial on integrating a custom Kubernetes installation, see Getting the Yandex Lockbox secret value on the custom Kubernetes installation side.
To configure access to a Yandex Lockbox secret from a Managed Service for Kubernetes cluster via the Yandex Cloud API using a workload identity federation:
- Get your cloud ready.
- Configure the Managed Service for Kubernetes cluster.
- Create a workload identity federation.
- Set up an IAM service account.
- Set up an Kubernetes service account.
- Link the IAM service account to the federation.
- Create a Yandex Lockbox secret.
- Test the integration.
If you no longer need the resources you created, delete them.
Get your cloud ready
Sign up for Yandex Cloud and create a billing account:
- Navigate to the management console
and log in to Yandex Cloud or create a new account. - On the Yandex Cloud Billing
page, make sure you have a billing account linked and it has theACTIVEorTRIAL_ACTIVEstatus. If you do not have a billing account, create one and link a cloud to it.
If you have an active billing account, you can create or select a folder for your infrastructure on the cloud page
Learn more about clouds and folders here.
Required paid resources
The infrastructure support cost includes:
- Fee for computing resources and disks for Managed Service for Kubernetes cluster nodes (see Yandex Compute Cloud pricing).
- Fee for using the Managed Service for Kubernetes master and outgoing traffic (see Managed Service for Kubernetes pricing).
- Fee for a Managed Service for Kubernetes cluster's public IP addresses (see Yandex Virtual Private Cloud pricing).
- Fee for storing the secret and requests to it (see Yandex Lockbox pricing).
Set up a Managed Service for Kubernetes cluster
-
If you do not have a Managed Service for Kubernetes cluster yet:
-
Tip
To use the
yc-metadata-serverDaemonSet controller on nodes for automatic exchange of Kubernetes service account tokens for an IAM token, create a cluster in theRAPIDrelease channel.Other release channels support manual exchange of Kubernetes service account tokens for an IAM token.
-
Create a node group.
-
Set up security groups for the cluster and node group.
-
-
To use the Yandex Cloud API, your cluster nodes must have internet access. Make sure your cluster nodes have public IP addresses assigned to them or the subnet they reside in has a configured NAT gateway or NAT instance. Also make sure the security group rules allow unrestricted outgoing traffic for your cluster nodes.
-
Set up integration with a workload identity federation for the cluster and node group:
Management consoleCLITerraformAPI- In the management console
, select the folder with your cluster. - Go to Managed Service for Kubernetes.
- Click
next to the cluster and select Edit. - Enable the workload identity federation in the Identity and access management field.
- Click Save.
- Under Identity and access management on the cluster overview page, copy the Issuer URL and JWKS key set URL values. You will need them to complete the integration.
- Navigate to the Node group tab.
- Click
next to the node group and select Edit. - Enable the workload identity federation in the Identity and access management field.
- Click Save.
If you do not have the Yandex Cloud CLI yet, install and initialize it.
The folder used by default is the one specified when creating the CLI profile. To change the default folder, use the
yc config set folder-id <folder_ID>command. You can also set a different folder for any specific command using the--folder-nameor--folder-idoptions.-
Enable support for integration with workload identity federation in the cluster:
yc managed-kubernetes cluster update \ --id <cluster_ID> \ --enable-workload-identity-federationResult:
done (3s) ... workload_identity_federation: enabled: true issuer: https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/catc7433801j******** jwks_uri: https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/catc7433801j********/jwks.jsonCopy the
workload_identity_federation.issuerandworkload_identity_federation.jwks_urivalues. You will need them to complete the integration. -
Enable support for integration with workload identity federation in the node group:
yc managed-kubernetes node-group update \ --id <node_group_ID> \ --enable-workload-identity-federationResult:
done (12s) ... workload_identity_federation: enabled: true
With Terraform
, you can quickly create a cloud infrastructure in Yandex Cloud and manage it using configuration files. These files store the infrastructure description written in HashiCorp Configuration Language (HCL). If you change the configuration files, Terraform automatically detects which part of your configuration is already deployed, and what should be added or removed.Terraform is distributed under the Business Source License
. The Yandex Cloud provider for Terraform is distributed under the MPL-2.0 license.For more information about the provider resources, see the relevant documentation on the Terraform
website or its mirror.If you do not have Terraform yet, install it and configure the Yandex Cloud provider.
-
Add the
workload_identity_federationsection to the cluster manifest in the Terraform configuration file:resource "yandex_kubernetes_cluster" "my_cluster" { ... workload_identity_federation { enabled = true } } -
Add the
workload_identity_federationsection to the node group manifest in the Terraform configuration file:resource "yandex_kubernetes_node_group" "my_node_group" { ... workload_identity_federation { enabled = true } } -
Make sure the configuration files are correct.
-
In the command line, navigate to the directory that contains the current Terraform configuration files defining the infrastructure.
-
Run this command:
terraform validateTerraform will show any errors found in your configuration files.
-
-
Confirm updating the resources.
-
Run this command to view the planned changes:
terraform planIf you described the configuration correctly, the terminal will display a list of the resources to update and their parameters. This is a verification step that does not apply changes to your resources.
-
If everything looks correct, apply the changes:
-
Run this command:
terraform apply -
Confirm updating the resources.
-
Wait for the operation to complete.
-
-
-
Get the issuer URL (
issuer) and the JWKS keyset URL (jwks_uri) to configure the workload identity federation using the Terraform yandex_kubernetes_cluster data source.You can aslo find out these parameters in the management console
, using the CLI or API.
-
Use the update REST API method for the Cluster resource or the ClusterService/Update gRPC API call.
Note
Below, see parameters for the REST API request body. To specify a parameter in a gRPC API call, convert its name from lower CamelCase
to snake_case , e.g.,minResourcePresetIdbecomesmin_resource_preset_id.Provide the following in the request:
-
Cluster ID in the
clusterIdparameter. -
updateMaskset toworkloadIdentityFederation.enabled.Warning
The API method will assign default values to all the parameters of the object you are modifying unless you explicitly provide them in your request. To avoid this, list the settings you want to change in the
updateMaskparameter as a single comma-separated string. -
workloadIdentityFederationset to"enabled": "true".
Copy the
workloadIdentityFederation.issuerandworkloadIdentityFederation.jwksUrivalues from the response. You will need them later. -
-
Use the update REST API method for the NodeGroup resource or the NodeGroupService/Update gRPC API call.
Provide the following in the request:
- Node group ID in the
nodeGroupIdparameter. updateMaskset toworkloadIdentityFederation.enabled.workloadIdentityFederationset to"enabled": "true".
- Node group ID in the
- In the management console
Create a workload identity federation
- In the management console
, select the folder you want to access via the Yandex Cloud API. - Go to Identity and Access Management.
- In the left-hand panel, select
Workload identity federations. - Click Create federation.
- In the Issuer value (iss) field, enter the Issuer URL value you got earlier, e.g.,
https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/c49i54tk66ob********. - In the Acceptable Audience values (AUD) field, also enter the Issuer URL value.
- In the JWKS address field, enter the JWKS key set URL value you got earlier, e.g.,
https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/c49i54tk66ob********/jwks.json. - In the Name field, enter a name for the federation, e.g.,
test-iam-federation. - Click Create.
Run this command:
yc iam workload-identity oidc federation create \
--name <federation_name> \
--issuer "<issuer_URL>" \
--audiences "<issuer_URL>" \
--jwks-url "<JWKS_URL>"
Where:
--name: Name of the new federation, e.g.,test-iam-federation.--issuerand--audiences: Issuer URL value you got earlier, e.g.,https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/c49i54tk66ob********.--jwks-url: JWKS URL value you got earlier, e.g.,https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/c49i54tk66ob********/jwks.json.
Result:
id: aje2c4qv19lf********
name: test-iam-federation
folder_id: b1gfq9pe6rd2********
enabled: true
audiences:
- https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/c49i54tk66ob********
issuer: https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/c49i54tk66ob********
jwks_url: https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/c49i54tk66ob********/jwks.json
created_at: "2024-12-28T16:04:31.530652473Z"
Save the federation ID for later use.
-
In the Terraform configuration file, define the parameters of the federation you want to create:
resource "yandex_iam_workload_identity_oidc_federation" "wlif" { name = "<federation_name>" folder_id = "<folder_ID>" issuer = "<issuer_URL>" audiences = ["<issuer_URL>"] jwks_url = "<JWKS_URL>" }Where:
name: Name of the new federation, e.g.,test-iam-federation.folder_id: ID of the folder you are creating the workload identity federation in.issuerandaudiences: Issuer URL value you got earlier, e.g.,https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/c49i54tk66ob********.jwks_url: JWKS URL value you got earlier, e.g.,https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/c49i54tk66ob********/jwks.json.
-
Make sure the configuration files are correct.
-
In the command line, navigate to the directory that contains the current Terraform configuration files defining the infrastructure.
-
Run this command:
terraform validateTerraform will show any errors found in your configuration files.
-
-
Confirm creating the resources.
-
Run this command to view the planned changes:
terraform planIf you described the configuration correctly, the terminal will display a list of the resources to update and their parameters. This is a verification step that does not apply changes to your resources.
-
If everything looks correct, apply the changes:
-
Run this command:
terraform apply -
Confirm updating the resources.
-
Wait for the operation to complete.
-
Save the federation ID for later use.
-
To create a workload identity federation, use the create REST API method for the Federation resource or the FederationService/Create gRPC API call.
Set up an IAM service account
-
Create a service account named IAM:
Management consoleCLITerraformAPI- In the management console
, select the folder with the Yandex Lockbox secret. - Go to Identity and Access Management.
- Click Create service account.
- Specify the service account name, e.g.,
sa-lockbox. - Click Create.
- Select the service account you created and save its ID, as you will need it later.
Run this command:
yc iam service-account create --name sa-lockboxResult:
done (2s) id: aje7s96nvmdp******** folder_id: b1gsm0k26v1l******** created_at: "2026-03-12T12:16:01Z" name: sa-lockboxSave the IAM service account ID for later use.
-
In the configuration file, describe the resources you want to create:
resource "yandex_iam_service_account" "sa" { name = "<service_account_name>" folder_id = "<folder_ID>" }Where:
name: Service account name, e.g.,sa-lockbox.folder_id: Folder ID.
-
Make sure the configuration files are correct.
-
In the command line, navigate to the directory that contains the current Terraform configuration files defining the infrastructure.
-
Run this command:
terraform validateTerraform will show any errors found in your configuration files.
-
-
Confirm creating the resources.
-
Run this command to view the planned changes:
terraform planIf you described the configuration correctly, the terminal will display a list of the resources to update and their parameters. This is a verification step that does not apply changes to your resources.
-
If everything looks correct, apply the changes:
-
Run this command:
terraform apply -
Confirm updating the resources.
-
Wait for the operation to complete.
-
Save the IAM service account ID for later use.
-
Use the create REST API method for the ServiceAccount resource or the ServiceAccountService/Create gRPC API call.
- In the management console
-
Assign the
lockbox.payloadViewerrole for the folder to the service account:Management consoleCLITerraformAPI- In the management console
, select the folder where you created the service account. - Navigate to the Access bindings tab.
- Click Configure access.
- In the window that opens, select Service accounts.
- Select the service account you created earlier.
- Click
Add role and select thelockbox.payloadViewerrole. - Click Save.
Run this command by specifying the folder and service account IDs:
yc resource-manager folder add-access-binding <folder_ID> \ --role lockbox.payloadViewer \ --subject serviceAccount:<service_account_ID>-
In the configuration file, describe the resources you want to create:
resource "yandex_resourcemanager_folder_iam_member" "lockbox" { folder_id = "<folder_ID>" role = "lockbox.payloadViewer" member = "serviceAccount:<service_account_ID>" }Where:
folder_id: Folder ID.role: Role being assigned, e.g.,lockbox.payloadViewer.member: ID of the service account you are assigning the role to. Use this format:serviceAccount:<service_account_ID>.
-
Make sure the configuration files are correct.
-
In the command line, navigate to the directory that contains the current Terraform configuration files defining the infrastructure.
-
Run this command:
terraform validateTerraform will show any errors found in your configuration files.
-
-
Confirm creating the resources.
-
Run this command to view the planned changes:
terraform planIf you described the configuration correctly, the terminal will display a list of the resources to update and their parameters. This is a verification step that does not apply changes to your resources.
-
If everything looks correct, apply the changes:
-
Run this command:
terraform apply -
Confirm updating the resources.
-
Wait for the operation to complete.
-
-
Use the UpdateAccessBindings REST API method for the Folder resource or the FolderService/UpdateAccessBindings gRPC API call.
- In the management console
Set up an Kubernetes service account
-
Connect to the Managed Service for Kubernetes cluster using
kubectl. -
Create a manifest named
service-account.yamlfor the Kubernetes service account with the following contents:apiVersion: v1 kind: ServiceAccount metadata: name: wlif annotations: yandex.cloud/federated-yc-service-account-id: <IAM_service_account_ID> -
Apply the manifest:
kubectl apply -f service-account.yaml -
To check the
ServiceAccountresource you created, run this command:kubectl describe serviceaccount wlifResult:
Name: wlif Namespace: default ... -
Save the values of the
NameandNamespacefields, as you will need them later.
Link the IAM service account to the federation
-
In the management console
, select the folder the service account was created in. -
Go to Identity and Access Management.
-
In the list of service accounts, select
sa-lockbox. -
Navigate to the Workload identity federations tab.
-
Click Link to federation.
-
In the Workload identity federation field, select the federation you created earlier.
-
In the Subject value (sub) field, specify the ID of the previously created Kubernetes service account in
system:serviceaccount:<namespace>:<Kubernetes_service_account_name>format, where:namespace: Kubernetes service account'sNamespacefield value, e.g.,default.account_name: Kubernetes service account'sNamefield value, e.g.,wlif.
-
Click Link.
Run this command:
yc iam workload-identity federated-credential create \
--service-account-id <IAM_service_account_ID> \
--federation-id <federation_ID> \
--external-subject-id "system:serviceaccount:<namespace>:<Kubernetes_service_account_name>"
Where:
--service-account-id: IAM service account ID you got earlier.--federation-id: Workload identity federation ID you got earlier.--external-subject-id: External subject ID, where:namespace: Kubernetes service account'sNamespacefield value, e.g.,default.Kubernetes_service_account_name: Kubernetes service account'sNamefield value, e.g.,wlif.
Result:
id: aje401v1sup8********
service_account_id: ajek7v5j65cg********
federation_id: aje2c4qv19lf********
external_subject_id: system:serviceaccount:default:wlif
created_at: "2024-12-28T16:33:47.057632267Z"
-
In the Terraform configuration file, define the parameters of the federated credentials you want to create:
resource "yandex_iam_workload_identity_federated_credential" "fc" { service_account_id = "<service_account_ID>" federation_id = "<federation_ID>" external_subject_id = "system:serviceaccount:<namespace>:<Kubernetes_service_account_name>" }Where:
service_account_id: IAM service account ID you got earlier.federation_id: Workload identity federation ID you got earlier.external-subject-id: External subject ID, where:namespace: Kubernetes service account'sNamespacefield value, e.g.,default.external_subject_id_service_account_name: Kubernetes service account'sNamefield value, e.g.,wlif.
-
Make sure the configuration files are correct.
-
In the command line, navigate to the directory that contains the current Terraform configuration files defining the infrastructure.
-
Run this command:
terraform validateTerraform will show any errors found in your configuration files.
-
-
Confirm creating the resources.
-
Run this command to view the planned changes:
terraform planIf you described the configuration correctly, the terminal will display a list of the resources to update and their parameters. This is a verification step that does not apply changes to your resources.
-
If everything looks correct, apply the changes:
-
Run this command:
terraform apply -
Confirm updating the resources.
-
Wait for the operation to complete.
-
-
To create federated credentials, use the create REST API method for the FederatedCredential resource or the FederatedCredentialService/Create gRPC API call.
Create a Yandex Lockbox secret
- In the management console
, select the folder where you want to create your secret. - Go to Lockbox.
- Click Create secret.
- In the Name field, enter a name for the secret:
MY_SECRET. - Select Secret type
Custom. - In the Key field, enter a non-secret ID, e.g.,
test-secret. - In the Value field, enter the confidential data you want to store, e.g.,
hello-world. - Click Create.
- Save the ID of the secret. You will need it later.
Run this command:
yc lockbox secret create \
--name <secret_name> \
--payload "<array_with_secret_contents>" \
Where:
--name: Secret name, e.g.,MY_SECRET.--payload: Secret contents as a YAML or JSON array, e.g.,"[{'key': 'test-secret', 'text_value': 'hello-world'}]".
Result:
done (1s)
id: e6qduvprvcon********
folder_id: b1gsm0k26v1l********
created_at: "2026-03-12T13:02:15.543Z"
name: MY_SECRET
status: ACTIVE
current_version:
id: e6qr13mvsl8t********
secret_id: e6qduvprvcon********
created_at: "2026-03-12T13:02:15.543Z"
status: ACTIVE
payload_entry_keys:
- test-secret
-
In the configuration file, describe the secret parameters:
resource "yandex_lockbox_secret" "my_secret" { name = "<secret_name>" }Where
nameis the secret's name, e.g.,MY_SECRET. -
Check the secret's configuration for validity.
-
In the command line, navigate to the directory that contains the current Terraform configuration files defining the infrastructure.
-
Run this command:
terraform validateTerraform will show any errors found in your configuration files.
-
-
Confirm creating the secret.
-
Run this command to view the planned changes:
terraform planIf you described the configuration correctly, the terminal will display a list of the resources to update and their parameters. This is a verification step that does not apply changes to your resources.
-
If everything looks correct, apply the changes:
-
Run this command:
terraform apply -
Confirm updating the resources.
-
Wait for the operation to complete.
-
Save the ID of the secret. You will need it later.
-
-
Describe the secret's content properties in the configuration file:
resource "yandex_lockbox_secret_version_hashed" "my_version" { secret_id = "<secret_ID>" key_1 = "<secret_1_key>" text_value_1 = "<secret_1_value>" }Where:
secret_id: ID of the secret you are creating a version for.key_1: Secret key. A non-secret name for the value by which you will identify it, such astest-secret.text_value_1: Secret data in plain text, e.g.,hello-world.
-
Check the secret's content configuration for validity.
-
In the command line, navigate to the directory that contains the current Terraform configuration files defining the infrastructure.
-
Run this command:
terraform validateTerraform will show any errors found in your configuration files.
-
-
Confirm creating the secret's content.
-
Run this command to view the planned changes:
terraform planIf you described the configuration correctly, the terminal will display a list of the resources to update and their parameters. This is a verification step that does not apply changes to your resources.
-
If everything looks correct, apply the changes:
-
Run this command:
terraform apply -
Confirm updating the resources.
-
Wait for the operation to complete.
-
-
To create a secret, use the create REST API method for the Secret resource or the SecretService/Create gRPC API call.
Test the integration
Tip
Below is a scenario that uses the yc-metadata-server DaemonSet controller on nodes for automatic exchange of Kubernetes service account tokens for an IAM token available to clusters in the RAPID release channel. For clusters in other release channels, see Manual exchange of a Kubernetes service account token for an IAM token.
-
Connect to the Managed Service for Kubernetes cluster using
kubectl. -
Create a test pod manifest named
pod.yamlwith the following contents:apiVersion: v1 kind: Pod metadata: name: test-wlif spec: containers: - image: nginx name: nginx serviceAccountName: wlifWhere
spec:serviceAccountNameis the name of the Kubernetes service account you created earlier. -
Apply the manifest:
kubectl apply -f pod.yaml -
Make sure the status of the new pod switched to
Running:kubectl get pod test-wlifResult:
NAME READY STATUS RESTARTS AGE test-wlif 1/1 Running 0 1m -
Access the container:
kubectl exec test-wlif -it -- bash -
Install
jq:apt-get update >/dev/null 2>&1 && apt-get install -y jq >/dev/null 2>&1 -
Get an IAM token:
IAMTOKEN=$(curl -s -H 'Metadata-Flavor: Google' \ http://169.254.169.254/computeMetadata/v1/instance/service-accounts/default/token \ | jq -r '.access_token') -
Get the Yandex Lockbox secret:
curl -sH "Authorization: Bearer ${IAMTOKEN}" \ "https://payload.lockbox.api.cloud.yandex.net/lockbox/v1/secrets/<secret_ID>/payload"Result:
{ "entries": [ { "key": "test-secret", "textValue": "hello-world" } ], "versionId": "e6qsqiadrsnh********" }
Manual exchange of a Kubernetes service account token for an IAM token
-
Connect to the Managed Service for Kubernetes cluster using
kubectl. -
Create a test pod manifest named
pod.yamlwith the following contents:apiVersion: v1 kind: Pod metadata: name: test-wlif spec: containers: - image: nginx name: nginx volumeMounts: - mountPath: /var/run/secrets/tokens name: sa-token serviceAccountName: wlif volumes: - name: sa-token projected: sources: - serviceAccountToken: path: sa-token expirationSeconds: 7200 audience: https://storage.yandexcloud.net/mk8s-oidc/v1/clusters/c49i54tk66ob********Where:
spec:serviceAccountName: Name of the Kubernetes service account you created earlier.spec:volumes:projected:sources:serviceAccountToken:audience: Acceptable Audience values (AUD) value set when creating the federation.
-
Apply the manifest:
kubectl apply -f pod.yaml -
Make sure the status of the new pod switched to
Running:kubectl get pod test-wlifResult:
NAME READY STATUS RESTARTS AGE test-wlif 1/1 Running 0 1m -
Access the container:
kubectl exec test-wlif -it -- bash -
Set the required variables:
SA_ID="<IAM_service_account_ID>" && \ SECRET_ID="<Lockbox_secret_ID>" && \ SA_TOKEN="$(cat /var/run/secrets/tokens/sa-token)"Where:
SA_ID: IAM service account ID you got earlier.SECRET_ID: Yandex Lockbox secret ID you got earlier.SA_TOKEN: Kubernetes service account token.
-
Install
jq:apt-get update >/dev/null 2>&1 && apt-get install -y jq >/dev/null 2>&1 -
Get an IAM token:
IAMTOKEN=$(curl -sH "Content-Type: application/x-www-form-urlencoded" \ -d "grant_type=urn:ietf:params:oauth:grant-type:token-exchange&requested_token_type=urn:ietf:params:oauth:token-type:access_token&audience=${SA_ID}&subject_token=${SA_TOKEN}&subject_token_type=urn:ietf:params:oauth:token-type:id_token" \ -X POST https://auth.yandex.cloud/oauth/token | jq -r '.access_token') -
Get the Yandex Lockbox secret:
curl -sH "Authorization: Bearer ${IAMTOKEN}" \ "https://payload.lockbox.api.cloud.yandex.net/lockbox/v1/secrets/${SECRET_ID}/payload"Result:
{ "entries": [ { "key": "test-secret", "textValue": "hello-world" } ], "versionId": "e6qsqiadrsnh********" }
How to delete the resources you created
To stop paying for the resources you created:
- Delete the Yandex Lockbox secret.
- Delete the Managed Service for Kubernetes node group.
- Delete the Managed Service for Kubernetes cluster.