Launching the Platform/Self hosted/Prerequisites
Secret Management
Configure secret management for your self-hosted platform
Overview
Platform Options
- HashiCorp Vault
- Google Secret Manager
Key Features
- Secrets management
- Encryption key storage
- Secure credentials handling
- Private key management
Deployment Options
Google Secret Manager Setup
Enable the Secret Manager API
- Go to Google Cloud Console
- Navigate to Secret Manager
- Enable the Secret Manager API for your project
Create Service Account
- Navigate to IAM & Admin > Service Accounts
- Create a new service account
- Grant the following roles:
Secret Manager Admin
Download Credentials
- Create and download a JSON key for the service account
- Keep this file secure - you'll need it during platform installation
Google Secret Manager provides:
- Fully managed service
- Automatic replication
- Fine-grained IAM controls
- Audit logging
Helm Chart Values:
Make sure to:
- Enable Google Secret Manager in your Helm values
- Use the same project ID and credentials as in your platform configuration
- Properly format the service account JSON credentials
Information Collection
Required Values for Platform Installation
Choose one of the following configurations for your Helm values:
For Google Secret Manager:
- GCP Project ID
- Service Account JSON key
For HashiCorp Vault:
- Vault address/endpoint
- Role ID
- Secret ID
- Namespace (if using HCP Vault:
admin
)
Make sure to:
- Enable only one secret management solution (
vault
orgoogleSecretManager
) - Disable the other option by setting
enabled: false
- Provide all required values for your chosen solution
Validation
Troubleshooting
Google Secret Manager Issues
- Verify service account permissions
- Check credentials file format
- Confirm API is enabled
- Validate project ID
Vault Issues
- Verify Vault address
- Check network access
- Confirm TLS settings
- Validate namespace (HCP)
Need help? Contact [email protected] if you encounter any issues.