Skip to content

Add k8s for secrets#34259

Merged
maycmlee merged 7 commits intomay/op-secrets-managementfrom
may/secrets-k8s
Feb 3, 2026
Merged

Add k8s for secrets#34259
maycmlee merged 7 commits intomay/op-secrets-managementfrom
may/secrets-k8s

Conversation

@maycmlee
Copy link
Copy Markdown
Contributor

@maycmlee maycmlee commented Jan 30, 2026

What does this PR do? What is the motivation?

  • Adds a K8s tab to the Secrets Mgmt doc.
  • Adds Secrets Mgmt instructions for K8s in Install the Worker doc.

Merge instructions

Merge readiness:

  • Ready for merge

For Datadog employees:

Your branch name MUST follow the <name>/<description> convention and include the forward slash (/). Without this format, your pull request will not pass CI, the GitLab pipeline will not run, and you won't get a branch preview. Getting a branch preview makes it easier for us to check any issues with your PR, such as broken links.

If your branch doesn't follow this format, rename it or create a new branch and PR.

[6/5/2025] Merge queue has been disabled on the documentation repo. If you have write access to the repo, the PR has been reviewed by a Documentation team member, and all of the required checks have passed, you can use the Squash and Merge button to merge the PR. If you don't have write access, or you need help, reach out in the #documentation channel in Slack.

Additional notes

@maycmlee maycmlee added the WORK IN PROGRESS No review needed, it's a wip ;) label Jan 30, 2026
@maycmlee maycmlee requested a review from a team as a code owner January 30, 2026 21:34
@maycmlee maycmlee changed the title Add k8s Add k8s for secrets Jan 30, 2026
@github-actions
Copy link
Copy Markdown
Contributor

@maycmlee maycmlee removed the WORK IN PROGRESS No review needed, it's a wip ;) label Feb 2, 2026
```
--set service.ports[0].protocol=TCP,service.ports[0].port=8088,service.ports[0].targetPort=8282
```
1. If you are using **Secrets Management**,
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

^typo here? I see "If you are using Secrets Management" twice

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah yeah, forgot to clean that up. Thanks!

Comment on lines +296 to +299
secretFileContents:
{
"us1_api": "<api_key>",
"secret_identifier1": "<secret1>"
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A bit nuanced - I have to admit. But on the secrets management tab for the json file dropdown, the bootstrap.secretFileContents should still be in yaml format in the values.yaml file, similar to the yaml file dropdown on lines 349-351. Technically right now, the user can't actually pass in a local json or yaml file to configure their secretFileContents. They have to manually input their secrets in yaml format under the secretFileContents field. This is only specific for the K8s case (not the other installation platforms).

Copy link
Copy Markdown
Contributor Author

@maycmlee maycmlee Feb 2, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @jackie8c! Nuanced, but really important! That makes sense. Do you think we should just remove the K8s tab for JSON? And then for the YAML file section for K8s, say something like:

You can't pass in a file to configure secretFileContents but you can enter the your secrets and identifier mapping in secretFileContents?

Or should that info go elsewhere? It'd be a little confusing because the tab says YAML file, but I can't think of an alternative.

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we should keep the information where it is already in the respective secrets managers. I think we should retain the K8s tab for JSON and mention the same statement you would be using in the YAML file section for K8s: "You can't pass in a file to configure secretFileContents but you can enter the your secrets and identifier mappings in secretFileContents." Just to keep it consistent, in case they do actually use a local JSON file with their secrets.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done

@maycmlee maycmlee merged commit 3f31412 into may/op-secrets-management Feb 3, 2026
17 checks passed
@maycmlee maycmlee deleted the may/secrets-k8s branch February 3, 2026 18:25
maycmlee added a commit that referenced this pull request Feb 4, 2026
* [DOCS-12091] Add identifiers for sources (#33370)

* add identifiers for sources

* apply suggestions

* remove DD_OP_

* Add set secrets shortcode (#33432)

* add shortcode

* small edit

* Update layouts/shortcodes/observability_pipelines/set_secrets_intro.en.md

Co-authored-by: Brett Blue <84536271+brett0000FF@users.noreply.github.com>

---------

Co-authored-by: Brett Blue <84536271+brett0000FF@users.noreply.github.com>

* Update env vars for secrets mgmt (#33499)

* dest env vars

* update source env vars

* [DOCS-12091] Add Secrets Management tabs for sources (#33429)

* add sm tabs

* use set secrets intro shortcode

* update key pass

* fix commas

* add descriptions

* update

* fix case

* small edits

* [DOCS-12091] Add identifiers for destinations (#33411)

* update destinations

* revert change

* update set secrets aopensearch

* add set secrets to all destinations

* update descriptions

* Update content/en/observability_pipelines/destinations/amazon_security_lake.md

* Apply suggestions from code review

Co-authored-by: DeForest Richards <56796055+drichards-87@users.noreply.github.com>

* fix gpubsub link

* small edits

---------

Co-authored-by: DeForest Richards <56796055+drichards-87@users.noreply.github.com>

* [DOCS-12091] Update existing pipelines (#33815)

* updates

* add restart

* small edits

* updates for secrets (#33817)

* [DOCS-12091] Update  adv worker config for secrets management (#33825)

* add secrets

* small edit

* small edits

* [DOCS-12091] OP Route to multiple DD orgs (#33541)

* add info

* remove destination type restriction

* add metrics info

* small edits

* add search syntax link

* add images

* fix header

* add warning

* edits

* add limit

* [DOCS-12091] Add Secrets Mgmt doc and update Install the Worker (#33745)

* update platforms

* add linux

* add secrets doc

* update linux

* fix typo

* add secret manager instructions

* Apply suggestions from code review

Co-authored-by: Rosa Trieu <107086888+rtrieu@users.noreply.github.com>

* Apply suggestion from @rtrieu

Co-authored-by: Rosa Trieu <107086888+rtrieu@users.noreply.github.com>

* Apply suggestion from @maycmlee

---------

Co-authored-by: Rosa Trieu <107086888+rtrieu@users.noreply.github.com>

* Add k8s for secrets (#34259)

* add k8s

* add bootstrap file links

* updates

* fix typo

* update region name placeholder

* small updates

* update file methods

* small edits

* update image

---------

Co-authored-by: Brett Blue <84536271+brett0000FF@users.noreply.github.com>
Co-authored-by: DeForest Richards <56796055+drichards-87@users.noreply.github.com>
Co-authored-by: Rosa Trieu <107086888+rtrieu@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants