github.com/argoproj/argo-events@v1.9.1/examples/event-sources/aws-sqs.yaml (about) 1 apiVersion: argoproj.io/v1alpha1 2 kind: EventSource 3 metadata: 4 name: aws-sqs 5 spec: 6 sqs: 7 example: 8 # jsonBody specifies that all event body payload coming from this 9 # source will be JSON 10 jsonBody: true 11 # accessKey contains information about K8s secret that stores the access key 12 accessKey: 13 # Key within the K8s secret whose corresponding value (must be base64 encoded) is access key 14 key: accesskey 15 # Name of the K8s secret that contains the access key 16 name: aws-secret 17 # secretKey contains information about K8s secret that stores the secret key 18 secretKey: 19 # Key within the K8s secret whose corresponding value (must be base64 encoded) is secret key 20 key: secretkey 21 # Name of the K8s secret that contains the secret key 22 name: aws-secret 23 # aws region 24 region: us-east-1 25 # name of the queue. The eventsource resolves the url of the queue from the queue name. 26 queue: test 27 # The duration (in seconds) for which the call waits for a message to arrive in the queue before returning. 28 # MUST BE > 0 AND <= 20 29 waitTimeSeconds: 20 30 31 # example-without-credentials: 32 # # If AWS access credentials are already present on the Pod's IAM role running the EventSource, 33 # # the AWS session will utilize the existing config and hence we do not need to provide explicit credentials. 34 # region: "us-east-1" 35 # queue: "my-fake-queue-2" 36 # waitTimeSeconds: 20 37 38 # cross-aws-account: 39 # # Make sure AWS access credentials have permissions to "GetQueueUrl", "ReceiveMessage", and "DeleteMessage" of cross account Queue 40 # accessKey: 41 # key: accesskey 42 # name: aws-secret 43 # secretKey: 44 # key: secretkey 45 # name: aws-secret 46 # namespace: argo-events 47 # region: "us-east-1" 48 # # name of queue to monitor 49 # queue: "other-queue-name-3" 50 # # AWS Account Id that created the queue 51 # queueAccountId: "12345678" 52 # waitTimeSeconds: 20