Secrets
Learn how to use secrets in your pipeline configuration
How are secrets stored
Calyptia Core stores all the secrets encrypted using RSA Public key cryptography.
Each deployment of Calyptia Core has its unique key pair (private, public) generated when the new instance registers, Calyptia Cloud does not store this private key on any form.
When a new instance of Calyptia Core gets registered, a new unique key pair is generated and the private key is stored in the local cluster as an opaque secret. When a pipeline is deployed or updated and it requires a secret, that secret is fetched encrypted from Calyptia Cloud and decrypted by the CEFB instance using the in-memory private RSA key.
The following diagrams illustrate the secret generation and usage.
Using Secrets
To reference secrets you need to create a new file in your local environment and then add them within your configuration. For example, in our pipeline-es.conf
we do not want to specify HTTP_Passwd in plain text. Instead we will use a secret with a variable es_http_passwd
. This variable is defined in the secrets.env
file below.
pipeline-es.conf
Now you need to define them in another file:
secrets.env
Creating a pipeline with a secret
When creating a pipeline we will need to ensure that we specify --secrets-file
such that the pipeline configuration will be able to use them. The command for that is below:
Update a Secret's Value
In the case that you need to update a secret, you can update them by first listing all secrets and then updating the secret with new values.
List all the secrets from a pipeline:
You can take the secret ID and use it to update its value:
Last updated