Injecting environment variables from Kubernetes Secret
Inject sensitive data (passwords, API keys, tokens) from Kubernetes Secret as environment variables in your Job (Data Integration, Big Data, and Data Services) and Routes tasks so they can easily and securely access credentials.
Information noteImportant: Your sensitive data is stored in your Kubernetes Secret
and managed by your organization's security policy. The Dynamic Engine
customization pattern only provides the access to this information to the tasks deployed in
your Dynamic Engine
environments. Qlik does not
manage your sensitive data.
Before you begin
Procedure
Results
Tasks in your Dynamic Engine environment now have secure access to sensitive credentials from Kubernetes Secret. You can rotate credentials by updating the Secret, and the changes are applied as follows:
- Data Integration (including Big Data) tasks are one-time tasks. Updated values are read when the next task run starts.
- Routes and Data Services are always-on tasks; they do not automatically reload Secret changes. Update the task in Talend Management Console to trigger a re-deployment in your Dynamic Engine environment.