Thank you so much for your answer,
I was wondering if we can consume secrets (which are sourced as environment variables) from one container (for reference - from deployment config) to another container with the same name, image and namespace (this second container is a cron job which is consuming secrets from another safe). Is this possible ? these secrets are fetched from the vault using the annotations and as mentioned before both of these secrets belong to different safes and have different roles.
Uhh, I don’t think you are solving the same problem as others are.
The workflow with Vault and External Secrets Operator will always be:
Store secrets in Vault (either manually or automatically, from CI or elsewhere)
Create permission scoping for service account/namespace in Vault based on the Kubernetes Auth method
Retrieve secrets either using the agent injector (which, for one pod, doesn’t allow to use multiple roles) or use External Secrets Operator to sync the Vault secrets you need to the namespace you need. Then, you can use Kubernetes primitives like secretRef and the like to inject the secret into your app.