Secrets vaults
Importing secrets from external secrets managers
You can import environment variables from Release Secrets Manager, AWS Secrets Manager, AWS Systems Manager Parameter Store (SSM), and GCP Secret Manager using the format $secrets.<provider abbreviation>.<secret_name>
for the value. The key and secret will follow the same variable schema as any other secret environment variable:
key:
type: String
description: Env variable name
required: true
value:
type: String
description: Representation of the value to be fetched. $secrets.<provider_abbreviation>.<secret_name> format. If secret is true, and this field is omitted, will use previously saved value.
required: true (but hidden if secret)
secret:
type: Boolean
description: Value is secret and should be encrypted and not visible in the UI when viewing
required: false, but required for secrets manager imports
Here are the provider abbreviations:
Release Secrets Manager
rsm
AWS Secrets Manager
aws
AWS Systems Manager Parameter Store
ssm
GCP Secret Manager
gcp
If you are an AWS GovCloud user, contact us to enable beta access.
Referencing cloud secrets
Navigate to the Settings page and click the Edit button to modify the "Environment Variables" file. Paste the formatted value into the "Environment Variables" file, following the schema requirements. Ensure you set secret
to true
and choose a unique key value.
- key: TEST_SSM
value: $secrets.ssm.test
secret: true
- key: TEST_AWS
value: $secrets.aws.test
secret: true
- key: TEST_GCP
value: $secrets.gcp.test
secret: true
- key: TEST_RELEASE
value: $secrets.rsm.test
secret: true
Release will fetch and encode the values of the secrets before applying them.
Caution: To reset the fetched value, you must redeploy. An updated value in an external secrets manager will not update the stored encoded value.
Copying referenced secrets
Navigate to Configuration -> Secrets. Select a secrets provider tab. Additional dropdowns for cloud integration and region will appear if relevant. Only cloud integrations with running clusters will be displayed in the dropdown for GCP, AWS, and SSM.
Click the copy icon to copy the formatted value.
Creating Release secrets
Navigate to Configuration -> Secrets. Select the Release tab. Click Create Release Secret.
Fill out the key and value, then click the ✔
.
Creating AWS secrets
Navigate to Configuration -> Secrets. Select the AWS logo from the dropdown menu. Additional dropdown menus for cloud integration and region will appear if relevant. Click + Create AWS Secret.
Fill out the Key/Name, Value, and Description fields. Click Create Secret. A success or error message will appear. Any parameter created here will have the tag {"created\_by" : "release"}
.
Creating AWS Systems Manager Parameter Store parameters
Navigate to Configuration -> Secrets. Select the AWS logo from the dropdown menu. Additional dropdown menus for cloud integration and region will appear if relevant. Click + Create SSM Parameter. Fill out the Key/Name and Value fields. Select a type from String, StringList, or SecureString.
Click Save. A success or error message will appear. Any parameter created here will have the tag {"created\_by" : "release"}
.
Last updated
Was this helpful?