Secrets management
Sometimes you connect the Quix Connectors, or services you have created, to other services, such as AWS, Vonage, Twilio, Azure and so on. You usually need to provide credentials to access these third-party APIs and services, using environment variables.
You do not want to expose these credentials through the use of environment variables in your YAML code, service code, Git repository, or even the UI, which may have shared access. Quix provides a feature to enable your credentials to be stored securely - secrets management.
Using secrets management, you can create secret variables whose value is hidden in code (Git repository and Application code view), UI, and YAML code. The value is encrypted. This is ideal for environment variables used to provide credentials to third-party services and APIs in a secure manner.
Create a secret variable
To create a secret variable:
-
In the code view for your application, select
Secrets management
: -
Click
+ New variable
. -
Give your secret variable a name, a default value, and a value for the current environment, or environments if you have more than one for this project.
-
Click
Save changes
to save the secret variable.
To use a secret variable
You can't use the secret variable directly, you need to create an environment variable that uses it.
To create an environment variable that uses a secret variable:
-
In the
Add Variable
dialog, select thesecret
icon. -
Give the environment variable a name.
-
Select the corresponding secret variable from the dropdown list.
Now, when the environment variable appears in code or the UI, its value is the secret variable you assigned, but you cannot not see the value of the secret variable, only its name.