Secrets
Use Terraform to manage Secrets in Kubiya:
Last updated
Was this helpful?
Use Terraform to manage Secrets in Kubiya:
Last updated
Was this helpful?
You can add secrets to Kubiya via our Terraform Provider.
Security Note: When you add secrets, they are classified as sensitive information and Terraform will hide secrets in its output.
Want to know more about Secrets in Kubiya?
Provides a Kubiya Secret resource. This allows secrets to be created, updated, and deleted on the Kubiya platform. Secrets store sensitive information that can be securely accessed by Kubiya agents.
The following arguments are supported:
name
- (Required) The name of the secret.
description
- (Required) A description of the secret.
data
- (Required) Map of key-value pairs containing the secret data. These values are stored securely and can be accessed by agents that have permissions to use this secret.
In addition to the arguments above, the following attributes are exported:
id
- The ID of the secret.
created_at
- The timestamp when the secret was created.
updated_at
- The timestamp when the secret was last updated.
Secrets can be imported using the id
:
Secrets should never be stored in plain text in your Terraform files. Instead, use variables or environment variables to pass sensitive values to your Terraform configuration.
Example with environment variables:
Then run Terraform with: