Working with secrets
Learn how to work with secrets in Code Engine. In Code Engine, you can store your information as key-value pairs in secrets that can be consumed by your function, job, or application by using environment variables.
What are secrets and why would I use them?
In Code Engine, secrets (and configmaps) are a collection of key-value pairs. When mapped to environment variables, the NAME=VALUE
relationships are set such that the name of the environment variable corresponds to the "key"
of each entry in those maps, and the value of the environment variable is the "value" of that key.
A secret provides a method to include sensitive configuration information, such as passwords or SSH keys, to your deployment. By referencing values from your secret, you can decouple sensitive information from your deployment to keep your app, function, or job portable. Anyone who is authorized to your project can also view your secrets; be sure that you know that the secret information can be shared with those users. Secrets contain information in key-value pairs.
Because secrets and configmaps are similar entities (except secrets are stored more securely), the way you interact and work with secrets and configmaps is also similar. To learn more about configmaps, see Working with configmaps.
What kind of secrets can I create in Code Engine?
Code Engine supports various secrets and provides options for creating and working with secrets.
The following table summarizes the supported secrets in Code Engine.
Name | Description |
---|---|
Basic authentication | A secret that contains a username and password key.Use basic authentication secrets when you access a service that requires basic HTTP authentication. |
Generic | A secret that stores simple key-value pairs and Code Engine makes no assumptions about the defined key-value pairs nor about the intended use of the secret. Use generic secrets when you want to define your own key-value pairs to access a service. |
Registry | A secret that stores credentials to access a container registry. Use registry secrets when you work with Code Engine apps or jobs to access a container image. Or, you use Code Engine to build a container image and the registry secret is used by Code Engine to access the registry to store the built container image. This secret is also referred to as a Registry access secret in the CLI. |
Service access | A secret that stores credentials to access an IBM Cloud service instance. Use service access secrets when you work with service bindings in Code Engine. Code Engine can automatically generate this secret or you can create your own custom service access secret. |
SSH | A secret that stores credentials to authenticate to a service with an SSH key, such as authenticating to a Git repository, such as GitHub or GitLab. Use SSH secrets when you want Code Engine to build a container image for you. Code Engine uses this secret to access your source code in a code repository. For example, use this secret with build runs to access your source code in a repository, such as GitHub or GitLab. This secret is also used as a Git repository access secret in the CLI and Code repo access in the console. |
Transport Layer Security (TLS) | A secret that contains a signed TLS certificate, including all its intermediate certificates, and its corresponding private key from a certificate authority (CA). Use TLS secrets when you work with custom domain mappings in Code Engine. |
Creating secrets
Use secrets to provide sensitive information to your apps, jobs, or functions. Secrets are defined in key-value pairs and the data that is stored in secrets is encoded.
Creating a secret from the console
Learn how to create secrets from the Code Engine console.
Learn how to create the following types of secrets from the console.
Creating a generic secret from the console
Learn how to create generic secrets from the Code Engine console that can be consumed by functions, jobs, or apps as environment variables.
Before you begin, create a project.
- After your project is in Active status, click the name of your project on the Code Engine Projects page.
- From the Components page, click Secrets and configmaps.
- From the Secrets and configmaps page, click Create to create your secret.
- From the Create secret or configmap page, complete the following steps:
- Select Generic secret, and click Next.
- Provide a name; for example,
mysecret-generic
. - Click Add key-value pair. Specify one or more key-value pairs for this secret. For example, specify one key as
secret1
with the value ofmysecret1
and specify another key assecret2
with the value oftarget-secret
. The name that you choose for your key does not need to be the same as the name of your environment variable. Notice that the value for the key is hidden, but it can be viewed if needed. - Click Create to create the secret.
Now that your secret is created from the console, go to the Secrets and configmaps page to view a list of defined secrets and configmaps. You can apply filters to customize the list to meet your needs.
Creating a registry secret from the console
Learn how to create registry secrets from the Code Engine console that can be consumed by functions, jobs, apps, or builds for access to pull or push a container image.
Before you begin, create a project.
- After your project is in Active status, click the name of your project on the Code Engine Projects page.
- From the Components page, click Secrets and configmaps.
- From the Secrets and configmaps page, click Create to create your secret.
- From the Create secret or configmap page, complete the following steps:
- Select Registry secret, and click Next.
- Provide a name; for example,
mysecret-registry
. - Specify the target registry for this secret, such as IBM Cloud Container Registry or Docker Hub.
- Specify the location of the registry.
- Specify a username. If this secret is for IBM Cloud Container Registry, the username is
iamapikey
. If this secret is for Docker Hub, it is your Docker ID. - Enter the credentials for the username. For IBM Cloud Container Registry, use your IAM API key. For Docker Hub, you can use your Docker Hub password or an access token. For other target registries, specify the password or API key for the username.
- Click Create to create the secret.
Now that your secret is created from the console, go to the Secrets and configmaps page to view a list of defined secrets and configmaps. You can apply filters to customize the list to meet your needs.
For more information about working with image registries, see Accessing container registries.
Creating an SSH secret from the console
Learn how to create an SSH secret from the console that can be consumed by builds to access private source code repositories. An SSH secret stores credentials to authenticate to a service with an SSH key, such as authenticating to a Git repository, such as GitHub or GitLab.
Before you begin, create a project.
- After your project is in Active status, click the name of your project on the Code Engine Projects page.
- From the Components page, click Secrets and configmaps.
- From the Secrets and configmaps page, click Create to create your secret.
- From the Create secret or configmap page, complete the following steps:
- Select SSH secret, and click Next.
- Provide a name; for example,
mysecret-ssh
. - Add the SSH private key for this secret.
- Click Create to create the secret.
Now that your secret is created from the console, go to the Secrets and configmaps page to view a list of defined secrets and configmaps. You can apply filters to customize the list to meet your needs.
Use your SSH secret when working with private code repositories, such as Git repositories. See Accessing private code repositories.
Creating a TLS secret from the console
Learn how to create a TLS secret from the console that can be consumed by apps when you work with custom domain mappings in Code Engine. A Transport Layer Security (TLS) secret contains a signed TLS certificate, including all its intermediate certificates, and its corresponding private key from a certificate authority (CA).
Before you begin, create a project.
- After your project is in Active status, click the name of your project on the Code Engine Projects page.
- From the Components page, click Secrets and configmaps.
- From the Secrets and configmaps page, click Create to create your secret.
- From the Create secret or configmap page, complete the following steps:
- Select TLS secret, and click Next.
- Provide a name; for example,
mysecret-tls
. - Add the certificate chain and its private key. Note that you can concatenate the certificates by starting each in a new line. You can provide this information in a file.
- Click Create to create the secret.
Now that your secret is created from the console, go to the Secrets and configmaps page to view a list of defined secrets and configmaps. You can apply filters to customize the list to meet your needs.
Use your TLS secret when working with custom domain mappings in Code Engine.
Creating secrets with the CLI
Learn how to create secrets with the Code Engine CLI that can be consumed by apps, jobs, or functions as environment variables.
Before you begin
- Set up your Code Engine CLI environment.
- Create and work with a project.
Beginning with CLI version 1.42.0, defining and working with secrets in the CLI is unified under the secret
command group. See ibmcloud ce secret
commands. Use the --format
option to specify the category of secret, such as basic_auth
, generic
, ssh
, tls
, or registry
. The default value for the --format
option is generic
.
By using the secret create
command, you can create and manage various secret formats. For descriptions of the various secret formats, see What kind of secrets can I create in Code Engine?
Learn how to create the following types of secrets with the CLI,
Creating a basic authentication secret with the CLI
A basic authentication secret contains a username and password key and is used to access a service that requires basic HTTP authentication. The following example creates a basic authentication secret with credentials for myusername
and the associated password is provided in a file on the local workstation
ibmcloud ce secret create --name mysecret-basicauth --format basic_auth --username myusername --password-from-file ./password.txt
To display the details of this secret,
ibmcloud ce secret get --name mysecret-basicauth
Example output
Getting secret 'mysecret-basicauth'...
OK
Name: mysecret-basicauth
ID: abcdefgh-abcd-abcd-abcd-1a2b3c4d5e6f
Format: basic_auth
Project Name: myproject
Project ID: 01234567-abcd-abcd-abcd-abcdabcd1111
Age: 66s
Created: 2021-03-10T18:44:18-05:00
Data:
---
password: REDACTED
username: bXl1c2VybmFtZQ==
Notice that the value of the key username
for this basic authentication secret is encoded, and the value of password
is redacted. To display the secret data as decoded, use the --decode
option with
the secret get
command.
Creating a generic secret with the CLI
A generic secret stores simple key-value pairs and Code Engine makes no assumptions about the defined key-value pairs nor about the intended use of the secret.
You can create a generic secret with the secret create
command in one of the following ways. By default, a generic secret is created when the --format
option is not specified.
-
Create a secret directly from the command line by using the
--from-literal
option inKEY=VALUE
format. For example,ibmcloud ce secret create --name myliteralsecret --from-literal "TARGET=My literal secret"
-
Create a secret by using the
--from-file
option to point to a file. By using this option, all the contents of the file become the value for the key-value pair. For this example, use a file that is namedsecrets.txt
, which containsmy little secret1
.-
The following example uses the
--from-file KEY=FILE
format with thesecret create
command:ibmcloud ce secret create --name mysecretmsg1 --from-file TARGET=secrets.txt
-
The following example command uses the
--from-file FILE
format with thesecret create
command. In this example,TARGET
(no extension) is the name of the file, which is the same as the name of the environment variable that is known to the job.ibmcloud ce secret create --name mysecretmsg2 --from-file TARGET
-
-
Create a secret by using the
--from-env-file
option to point to a file that contains one or more lines that match the formatKEY=VALUE
. Each line from the specified file is added as a key-value pair. Any lines in the specified file that are empty or begin with#
are ignored. For this example, use a file that is namedsecrets_multi.txt
, which contains the key-value pairs:sec1=mysec1
,sec2=mysec2
, andsec3=mysec3
.ibmcloud ce secret create --name mysecretmulti --from-env-file secrets_multi.txt
If you want to create (or update) a generic secret from a file, use the --from-file
option with one of the following formats: --from-file FILE
or --from-file KEY=FILE
In Code Engine, when you use the
--from-file
option to specify secret values, all the contents within the file is the value for the key-value pair. When you use the option format of --from-file KEY=FILE
, the KEY
is name
of the environment variable that is known to your job, function, or app. When you use the option format of --from-file FILE
, FILE
is the name of the environment variable that is known to your job, function, or
app. If your file contains one or more key-value pairs, use the --from-env-file
option to add an environment variable for each key-value pair in the specified file. Any lines in the specified file that are empty or begin with
#
are ignored.
To display the details of the generic secret, myliteralsecret
,
ibmcloud ce secret get --name myliteralsecret
Example output
Getting secret 'myliteralsecret'...
OK
Name: myliteralsecret
ID: abcdefgh-abcd-abcd-abcd-1a2b3c4d5e6f
Format: generic
Project Name: myproject
Project ID: 01234567-abcd-abcd-abcd-abcdabcd1111
Age: 66s
Created: 2023-03-07 21:06:34 +0000 UTC
Data:
---
TARGET: TXkgbGl0ZXJhbCBzZWNyZXQ=
Notice that the value of the key TARGET
for this generic secret is encoded. To display the secret data as decoded, use the --decode
option with the secret get
command.
Creating a registry secret with the CLI
A registry secret stores credentials to access a container registry.
The following example creates a registry secret that is named mysecret-registry
to access an IBM Cloud Container Registry instance that is on the us.icr.io
registry server and specifies credentials for username
and password
.
ibmcloud ce secret create --name mysecret-registry --format registry --server us.icr.io --username iamapikey --password API_KEY
To display the details of this secret,
ibmcloud ce secret get --name mysecret-registry
Example output
Getting secret 'mysecret-registry'...
OK
Name: mysecret-registry
ID: abcdefgh-abcd-abcd-abcd-1a2b3c4d5e6f
Format: registry
Project Name: myproject
Project ID: 01234567-abcd-abcd-abcd-abcdabcd1111
Age: 66s
Created: 2023-03-07 20:00:45 +0000 UTC
Data:
---
email: ""
password: REDACTED
server: dXMuaWNyLmlv
username: aWFtYXBpa2V5
Notice that the value of the username
and server
keys for this registry secret is encoded, and the value of password
is redacted. To display the secret data as decoded, use the --decode
option with the secret get
command.
Creating an SSH secret with the CLI
An SSH secret stores credentials to authenticate to a service with an SSH key; for example, authenticating to a Git repository, such as GitHub or GitLab.
The following example creates an SSH secret that is named mysecret-ssh
to access a host that is included in the known_hosts
file by authenticating with an unencrypted SSH private key file that is located at /<filepath>/.ssh/<key_name>
,
where <filepath>
is the path on your local workstation. This command requires a name and a key path, and also allows other optional arguments such as the path to the known hosts file.
ibmcloud ce secret create --name mysecret-ssh --format ssh --key-path ~/.ssh/<key_name> --known-hosts-path ~/.ssh/known_hosts
To display the details of this secret,
ibmcloud ce secret get --name mysecret-ssh
Example output
Getting secret 'mysecret-ssh'...
OK
Name: mysecret-ssh'
ID: abcdefgh-abcd-abcd-abcd-1a2b3c4d5e6f
Format: ssh
Project Name: myproject
Project ID: 01234567-abcd-abcd-abcd-abcdabcd1111
Age: 66s
Created: 2023-03-07 19:19:59 +0000 UTC
Data:
---
known_hosts: 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
ssh-privatekey: REDACTED
Notice that the value of the known_hosts
key for this SSH secret is encoded, and the value of ssh-privatekey
is redacted. To display the secret data as decoded, use the --decode
option with the secret get
command.
Creating a TLS secret with the CLI
A Transport Layer Security (TLS) secret contains a signed TLS certificate, including all its intermediate certificates, and its corresponding private key from a certificate authority (CA). Use TLS secrets when you work with custom domain mappings.
The following example creates a TLS secret that is named mysecret-tls
. The certificate chain that corresponds to the custom domain is contained in the file certificate.txt
and the matching private key file is contained
in the file privatekey.txt
. In this example, both of these files are located in the root directory of the local workstation.
ibmcloud ce secret create --name mysecret-tls --format tls --cert-chain-file certificate.txt --private-key-file privatekey.txt
To display the details of this secret,
ibmcloud ce secret get --name mysecret-tls
Example output
Getting secret 'mysecret-tls'...
OK
Name: mysecret-tls'
ID: abcdefgh-abcd-abcd-abcd-1a2b3c4d5e6f
Format: tls
Project Name: myproject
Project ID: 01234567-abcd-abcd-abcd-abcdabcd1111
Age: 66s
Created: 2023-03-07 16:14:46 +0000 UTC
Data:
---
tls.crt: REDACTED
tls.key: REDACTED
Listing secrets with the CLI
After secrets are created, use the secret list
command to list all secrets in your project. For example,
ibmcloud ce secret list
Example output
Listing secrets...
OK
Name Format Data Age
ce-auto-icr-private-us-south registry 4 333d
ce-auto-private-icr-us-south registry 4 335d
myregistry-seccmd registry 4 3h31m
mysecret-basicauth basic_auth 2 7m37s
mysecret-generic generic 1 7m7s
mysecret-genericfromfile generic 2 2m29s
mysecret-registry registry 4 111s
mysecret-ssh ssh_auth 2 42m
mysecret-tls tls 2 3h47m
Updating secrets
You can change key-value pairs for existing secrets.
Updating secrets from the console
You can update key-value pairs for your defined secrets from the console.
-
You can update key-value pairs for your defined secrets from the console in one of the following ways.
- Go to the Secrets and configmaps page for your project and locate the secret that you want to update. Click the name of the secret that you want to update to open it.
- If your secret is referenced by an app, job, or function, then use the links in the environment variables table on the Environmental variables tab of your app, job, or function. These links take you directly to your secret. Alternatively, you can also go to the Secrets and configmaps page for your project and locate the secret that you want to update. Click the name of the secret that you want to update to open it.
-
Click Edit and make the updates for your secret.
-
Click Save to save the changes to your secret.
If your updated secret is referenced by a job, function, or app, then your job, function, or app must be restarted for the new data to take effect.
- Apps - From the page for your app, click New revision and then Save and deploy. Alternatively, you can wait for your app to scale to zero and when the app scales up, the app uses the updated secret.
- Jobs - From the page for your job, click Submit job to run your job, or you can rerun a job. This new job run uses the updated secret.
- Functions - From the page for your function, click Test Function. If you have a browser open to the function URL, refresh the browser.
Updating secrets with the CLI
You can update an existing secret and its key-value pairs with the CLI.
-
To change the value of a key-value pair in a defined secret, use the
secret update
command. Let's update themysecret-registry
secret to use a different server.ibmcloud ce secret update --name mysecret-registry --format registry --server <new_server> --username <new_username> --password <password>
-
Now that your secret is updated, use the
secret get
command to display details about a specific secret. If needed, use the--decode
option to display the secret data as decoded. For example,ibmcloud ce secret get --name mysecret-registry --decode
Example output
Getting generic secret 'mysecret-registry'... OK Name: mysecret-registry ID: abcdefgh-abcd-abcd-abcd-c88e2775388e Project Name: myproject Project ID: 01234567-abcd-abcd-abcd-abcdabcd1111 Age: 21m Created: 2023-03-07 20:00:45 +0000 UTC Data: --- email: "" password: REDACTED server: newserver username: newuser
Referencing secrets
Your job, function, or app can consume and use the information that is stored in a secret by using environment variables.
Referencing secrets from the console
You can use the console to create environment variables for your apps, jobs, and functions that fully reference a secret or reference individual keys in a secret.
Before you can reference a secret, it must exist. See create a secret. For this example, create a secret that is named target-secret
with the key-value pair of TARGET=Sunshine
.
-
To reference a defined secret from your apps, jobs, and functions, create an environment variable. The environment variable can fully reference an existing secret or reference an individual key in an existing secret. When you fully reference a secret (or configmap), you can optionally specify a
prefix
. For example, if you fully reference themysecret
secret from themyapp
application and use themysecret_
prefix, each key in the secret is prefixed withmysecret_
. -
After you create environment variables, you must restart your apps, jobs, and functions for the changes to take effect. For apps, save and deploy your app to update the app with the environment variables that you defined. For jobs, submit your job to update the job with the environment variables that you defined.
-
After the apps, jobs, and functions status changes to Ready, you can test the application or function, or run the job. For an app, click Test application and then click Send request in the Test application pane. To open the application in a web page, click Application URL. In the
myapp
example, because a prefix was specified for the fully referencedmysecret
secret, all the keys of this secret are referenced as environment variables and are prefixed withmysecret_
. For example, these environment variables display asmysecret_secret1=mysecret1
andmysecret_secret2=mysecret2
.
To update an environment variable that references a secret, see updating environment variables and considerations for updating environment variables.
To remove an environment variable that references a secret, see deleting environment variables.
For example, let's use the previously defined mysecret
secret that you defined from the console with a job and fully reference this secret with an environment variable.
-
Create and run a job. For this example, create a Code Engine job that uses the
icr.io/codeengine/codeengine
image and then run the job. When a request is sent to this sample job, the job reads theTARGET
environment variable, and the job printsHello ${TARGET} from Code Engine
and prints a list of environment variables. If theTARGET
environment variable is empty,Hello World from Code Engine
is returned.From the Jobs page,
- Create a job; for example,
myjob
. - Specify
icr.io/codeengine/codeengine
as the image reference. - Click Create to create the job.
If the workload that you want to use with the secret is already defined in Code Engine, go to the Applications, Jobs, or Functions page and then click the name of your app, job, or function to open the component.
- Create a job; for example,
-
When the job is created, from the Jobs page, click the name of your job to open it.
-
Update the job to add a secret as an environment variable. Click Environment variables to open the tab and click Add to add your environment variable.
-
From the Add environment variable page,
- To use the previously defined secret, select Reference full secret.
- From the menu, select the name of the secret that you want; for example,
target-secret
. - Click Add to add the environment variable.
- Click Save to save the changes to your job.
-
To run the job with the environment variable that references a secret, click Submit job. For this example, the logs of the
myjob
job run displayHello Sunshine from Code Engine
and the prints the environment variables, including any values of secrets that are referenced with environment variables.
Referencing secrets with the CLI
To use secrets with apps, jobs, and functions, you can set environment variables that fully reference a secret or reference individual keys in a secret with the CLI.
Referencing existing secrets with the CLI
The following examples reference a generic secret, which is the default secret when the --format
option is not specified. Use the --format
option to specify the category of secret, such as basic_auth
,
generic
, ssh
, tls
, or registry
.
To use a secret with a workload with the CLI, specify the --env-from-secret
option on the following commands.
The following example describes how to reference an existing generic secret with a job by using the CLI.
-
Use the
secret create
command to create the following two generic secrets for this scenario. By default, a generic secret is created when the--format
option is not specified.ibmcloud ce secret create --name myliteralsecret --from-literal "TARGET=My big literal secret"
ibmcloud ce secret create --name myliteralsecret2 --from-literal "TARGET=My little literal secret"
-
Create a job and reference the
myliteralsecret
secret. For this example, create a Code Engine job that uses theicr.io/codeengine/codeengine
image and then run the job. When a request is sent to this sample job, the job reads theTARGET
environment variable, and the job printsHello ${TARGET} from Code Engine
and prints a list of environment variables. If theTARGET
environment variable is empty,Hello World from Code Engine
is returned.ibmcloud ce job create --name myjob --image icr.io/codeengine/codeengine --array-indices 2-3 --env-from-secret myliteralsecret
-
Run the
myjob
job.ibmcloud ce jobrun submit --name myjobrun --job myjob
-
Use the
jobrun get
command to display details of the job run, including the instances of the job run.ibmcloud ce jobrun get --name myjobrun
Example output
Getting jobrun 'myjobrun'... Getting instances of jobrun 'myjobrun'... Getting events of jobrun 'myjobrun'... Run 'ibmcloud ce jobrun events -n myjobrun' to get the system events of the job run instances. Run 'ibmcloud ce jobrun logs -f -n myjobrun' to follow the logs of the job run instances. OK Name: myjobrun [...] Job Ref: myjob Environment Variables: Type Name Value Secret full reference myliteralsecret Image: icr.io/codeengine/codeengine Resource Allocation: CPU: 1 Ephemeral Storage: 4G Memory: 4G Runtime: Mode: task Array Indices: 2-3 Array Size: 2 JOP_ARRAY_SIZE Value: 2 Max Execution Time: 7200 Retry Limit: 3 Status: Completed: 9s Instance Statuses: Succeeded: 2 Conditions: Type Status Last Probe Last Transition Pending True 13s 13s Running True 9s 9s Complete True 9s 9s Events: Type Reason Age Source Messages Normal Updated 10s (x4 over 14s) batch-job-controller Updated JobRun "myjobrun" Normal Completed 10s batch-job-controller JobRun completed successfully Instances: Name Running Status Restarts Age myjobrun-2-0 0/1 Succeeded 0 14s myjobrun-3-0 0/1 Succeeded 0 14s
-
Display the logs of the
myjobrun
job run. You can display logs of all the instances of a job run or display logs of a specific instance of a job run. This time, display the logs of the all the instances of the job run. The log displaysHello my big literal secret!
, which was specified by using an environment variable with a secret. Note, for this job that is defined with theicr.io/codeengine/codeengine
image, the output of the job run prints the environment variables, including any values of secrets that are referenced with environment variables.ibmcloud ce jobrun logs --jobrun myjobrun
Example output
Getting logs for all instances of job run 'myjobrun'... Getting jobrun 'myjobrun'... Getting instances of jobrun 'myjobrun'... OK myjobrun-2-0/myjob: Hello from helloworld! I'm a batch job! Index: 2 Hello My big literal secret from: . ___ __ ____ ____ ./ __)/ \( \( __) ( (__( O )) D ( ) _) .\___)\__/(____/(____) .____ __ _ ___ __ __ _ ____ ( __)( ( \ / __)( )( ( \( __) .) _) / /( (_ \ )( / / ) _) (____)\_)__) \___/(__)\_)__)(____) Some Env Vars: -------------- HOME=/root HOSTNAME=myjobrun-2-0 JOB_INDEX=2 KUBERNETES_PORT=tcp://172.21.0.1:443 KUBERNETES_PORT_443_TCP=tcp://172.21.0.1:443 KUBERNETES_PORT_443_TCP_ADDR=172.21.0.1 KUBERNETES_PORT_443_TCP_PORT=443 KUBERNETES_PORT_443_TCP_PROTO=tcp KUBERNETES_SERVICE_HOST=172.21.0.1 KUBERNETES_SERVICE_PORT=443 KUBERNETES_SERVICE_PORT_HTTPS=443 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin PWD=/ SHLVL=1 TARGET=My big literal secret myjobrun-3-0/myjob: Hello from helloworld! I'm a batch job! Index: 3 Hello My big literal secret from: . ___ __ ____ ____ ./ __)/ \( \( __) ( (__( O )) D ( ) _) .\___)\__/(____/(____) .____ __ _ ___ __ __ _ ____ ( __)( ( \ / __)( )( ( \( __) .) _) / /( (_ \ )( / / ) _) (____)\_)__) \___/(__)\_)__)(____) Some Env Vars: -------------- HOME=/root HOSTNAME=myjobrun-3-0 JOB_INDEX=3 KUBERNETES_PORT=tcp://172.21.0.1:443 KUBERNETES_PORT_443_TCP=tcp://172.21.0.1:443 KUBERNETES_PORT_443_TCP_ADDR=172.21.0.1 KUBERNETES_PORT_443_TCP_PORT=443 KUBERNETES_PORT_443_TCP_PROTO=tcp KUBERNETES_SERVICE_HOST=172.21.0.1 KUBERNETES_SERVICE_PORT=443 KUBERNETES_SERVICE_PORT_HTTPS=443 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin PWD=/ SHLVL=1 TARGET=My big literal secret
-
Resubmit the job run and specify to use the
myliteralsecret2
secret for this job run.ibmcloud ce jobrun resubmit --jobrun myjobrun --name myjobrunresubmit --env-from-secret myliteralsecret2
When you update a job, app, or function with an environment variable that fully references a secret to fully reference a different secret, full references override other full references in the order in which they are set (the last referenced set overrides the first set).
-
Use the
jobrun get
command to display details of the job run, including the instances of the job run. Notice that the job run references bothmyliteralsecret
andmyliteralsecret2
secrets.ibmcloud ce jobrun get --name myjobrunresubmit
Example output
Getting jobrun 'myjobrunresubmit'... Getting instances of jobrun 'myjobrunresubmit'... Getting events of jobrun 'myjobrunresubmit'... [...] Name: myjobrunresubmit ID: 79f01367-932b-4a76-be18-b1e68790a85b Project Name: myproject Project ID: 841f0f38-420d-4388-b5d8-f230657d7dc6 Age: 14s Created: 2021-06-15T21:15:37-04:00 Job Ref: myjob Environment Variables: Type Name Value Secret full reference myliteralsecret Secret full reference myliteralsecret2 Image: icr.io/codeengine/codeengine Resource Allocation: CPU: 1 Ephemeral Storage: 4G Memory: 4G Runtime: Mode: task Array Indices: 2-3 Array Size: 2 JOP_ARRAY_SIZE Value: 2 Max Execution Time: 7200 Retry Limit: 3 Status: Completed: 11s Instance Statuses: Succeeded: 2 Conditions: Type Status Last Probe Last Transition Pending True 14s 14s Running True 12s 12s Complete True 11s 11s Events: Type Reason Age Source Messages Normal Updated 13s (x4 over 16s) batch-job-controller Updated JobRun "myjobrunresubmit" Normal Completed 13s batch-job-controller JobRun completed successfully Instances: Name Running Status Restarts Age myjobrunresubmit-2-0 0/1 Succeeded 0 16s myjobrunresubmit-3-0 0/1 Succeeded 0 16s
-
Display the job run logs of an instance of the
myjobrunresubmit
job run. This time, display the logs of themyjobrunresubmit-3-0
instance. The log displaysHello My little literal secret!
, which is the value that is specified in themyliteralsecret2
secret. Use thejobrun get
command to display the details of the job run, including the running instances of the job run.ibmcloud ce jobrun logs --instance myjobrunresubmit-3-0
Example output
Getting logs for job run instance 'myjobrunresubmit-3-0'... OK myjobrunresubmit-3-0/myjob: Hello from helloworld! I'm a batch job! Index: 3 Hello My little literal secret from: . ___ __ ____ ____ ./ __)/ \( \( __) ( (__( O )) D ( ) _) .\___)\__/(____/(____) .____ __ _ ___ __ __ _ ____ ( __)( ( \ / __)( )( ( \( __) .) _) / /( (_ \ )( / / ) _) (____)\_)__) \___/(__)\_)__)(____) Some Env Vars: -------------- HOME=/root HOSTNAME=myjobrunresubmit-3-0 JOB_INDEX=3 KUBERNETES_PORT=tcp://172.21.0.1:443 KUBERNETES_PORT_443_TCP=tcp://172.21.0.1:443 KUBERNETES_PORT_443_TCP_ADDR=172.21.0.1 KUBERNETES_PORT_443_TCP_PORT=443 KUBERNETES_PORT_443_TCP_PROTO=tcp KUBERNETES_SERVICE_HOST=172.21.0.1 KUBERNETES_SERVICE_PORT=443 KUBERNETES_SERVICE_PORT_HTTPS=443 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin PWD=/ SHLVL=1 TARGET=My little literal secret
-
To change the value of key-value pair in a secret, use the
secret update
command. Let's update themyliteralsecret
secret to change the value of theTARGET
key fromMy big literal secret
toMy new big literal secret
.ibmcloud ce secret update --name myliteralsecret --from-literal "TARGET=My new big literal secret"
-
For the new data to take effect, run your job again. Resubmit the job run again and specify to use the
myliteralsecret
secret for this job run.ibmcloud ce jobrun resubmit --jobrun myjobrun --name myjobrunresubmit2 --env-from-secret myliteralsecret
-
Display the logs of the
myjobrunresubmit2
job run. This time, the job log displaysHello My new big literal secret!
, which is the value in the updatedmyliteralsecret
secret. You can use thejobrun get
command to display the details of the job run, including the running instances of the job run. Display the logs for any running instance of the job run.ibmcloud ce jobrun logs --instance myjobrunresubmit2-2-0
Example output
Getting logs for job run instance 'myjobrunresubmit2-2-0'... OK myjobrunresubmit2-2-0/myjob: Hello from helloworld! I'm a batch job! Index: 2 Hello My new big literal secret from: . ___ __ ____ ____ ./ __)/ \( \( __) ( (__( O )) D ( ) _) .\___)\__/(____/(____) .____ __ _ ___ __ __ _ ____ ( __)( ( \ / __)( )( ( \( __) .) _) / /( (_ \ )( / / ) _) (____)\_)__) \___/(__)\_)__)(____) Some Env Vars: -------------- HOME=/root HOSTNAME=myjobrunresubmit2-2-0 JOB_INDEX=2 KUBERNETES_PORT=tcp://172.21.0.1:443 KUBERNETES_PORT_443_TCP=tcp://172.21.0.1:443 KUBERNETES_PORT_443_TCP_ADDR=172.21.0.1 KUBERNETES_PORT_443_TCP_PORT=443 KUBERNETES_PORT_443_TCP_PROTO=tcp KUBERNETES_SERVICE_HOST=172.21.0.1 KUBERNETES_SERVICE_PORT=443 KUBERNETES_SERVICE_PORT_HTTPS=443 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin PWD=/ SHLVL=1 TARGET=My new big literal secret
To summarize, you completed basic scenarios to demonstrate how to use secrets with a job by referencing an existing full secret and updating keys within a secret.
Referencing secrets that are not yet defined with the CLI
If a secret does not exist before it is referenced, an app will not deploy successfully, and a job or function will not run successfully until the referenced secret is created.
If you are working with an app, job, or function and the referenced secret is not yet defined, use the --force
option to avoid verification of the existence of the referenced secret. The --force
option can be used
with the following commands.
When you use the --force
option with these commands, the action to create, update, or run the app, job, or function completes. However, the app, job, or function will not run successfully until the referenced secret exists.
If you add the --no-wait
option in addition to the --force
option to the command, the system completes the action, and does not wait for the app, job, or function to run successfully.
The following example describes how to reference a secret that is not yet defined with a job by using the CLI.
-
Create a job. For this example, create a Code Engine job that uses the
icr.io/codeengine/codeengine
image and then run the job. When a request is sent to this sample job, the job reads theTARGET
environment variable, and the job printsHello ${TARGET} from Code Engine
and prints a list of environment variables. If theTARGET
environment variable is empty,Hello World from Code Engine
is returned.ibmcloud ce job create --name myjob --image icr.io/codeengine/codeengine
-
Use the
jobrun submit
command to run themyjob
job. Note that themynewliteralsecret
does not exist. By using the--no-wait
option with thejobrun submit
command, the job run is submitted and does not wait for the instances of this job run to complete.ibmcloud ce jobrun submit --name myjobrun1 --job myjob --env-from-secret mynewliteralsecret --force --no-wait
-
Use the
jobrun get
command to display details of the job run, including the environment variable information. Notice that the job run is inpending
status.ibmcloud ce jobrun get --name myjobrun1
Example output
Getting jobrun 'myjobrun1'... Getting instances of jobrun 'myjobrun1'... Getting events of jobrun 'myjobrun1'... [...] Name: myjobrun1 [...] Job Ref: myjob Environment Variables: Type Name Value Secret full reference mynewliteralsecret Image: icr.io/codeengine/codeengine Resource Allocation: CPU: 1 Ephemeral Storage: 400M Memory: 4G Runtime: Mode: task Array Indices: 0 Array Size: 1 JOP_ARRAY_SIZE Value: 1 Max Execution Time: 7200 Retry Limit: 3 Status: Instance Statuses: Pending: 1 Conditions: Type Status Last Probe Last Transition Pending True 100s 100s Events: Type Reason Age Source Messages Normal Updated 108s (x5 over 2m29s) batch-job-controller Updated JobRun "myjobrun1" Instances: Name Running Status Restarts Age myjobrun1-0-0 0/1 Pending 0 2m29s
-
Create the secret.
ibmcloud ce secret create --name mynewliteralsecret --from-literal "TARGET=Fun secret"
-
Run the
myjobrun1
job run again.ibmcloud ce jobrun resubmit --jobrun myjobrun1 --name myjobrunresubmit1
Run the
ibmcloud ce jobrun get -n myjobrunresubmit1
command to check the status of this job run. -
Display the logs of the
myjobrunresubmit1
job run. The logs displayHello Fun secret from Code Engine
, which confirms the job run referenced themyliteralsecret
secret.ibmcloud ce jobrun logs --jobrun myjobrunresubmit1
Example output
Getting logs for all instances of job run 'myjobrunresubmit1'... Getting jobrun 'myjobrunresubmit1'... Getting instances of jobrun 'myjobrunresubmit1'... OK myjobrunresubmit1-0-0/myjob: Hello from helloworld! I'm a batch job! Index: 0 Hello Fun secret from: . ___ __ ____ ____ ./ __)/ \( \( __) ( (__( O )) D ( ) _) .\___)\__/(____/(____) .____ __ _ ___ __ __ _ ____ ( __)( ( \ / __)( )( ( \( __) .) _) / /( (_ \ )( / / ) _) (____)\_)__) \___/(__)\_)__)(____) Some Env Vars: -------------- HOME=/root HOSTNAME=myjobrunresubmit1-0-0 JOB_INDEX=0 KUBERNETES_PORT=tcp://172.21.0.1:443 KUBERNETES_PORT_443_TCP=tcp://172.21.0.1:443 KUBERNETES_PORT_443_TCP_ADDR=172.21.0.1 KUBERNETES_PORT_443_TCP_PORT=443 KUBERNETES_PORT_443_TCP_PROTO=tcp KUBERNETES_SERVICE_HOST=172.21.0.1 KUBERNETES_SERVICE_PORT=443 KUBERNETES_SERVICE_PORT_HTTPS=443 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin PWD=/ SHLVL=1 TARGET=Fun secret
For more detailed scenarios about referencing full secrets and configmaps as environment variables, overriding references, and removing references in the CLI, see Referencing secrets and configmaps.
Deleting secrets
When you no longer need a secret, you can delete it.
Deleting secrets from the console
- To delete a secret from the console,
- Go to the Secrets and configmaps page from your Code Engine Projects page.
- Click the secret that you want to delete to open its page.
- From the page for the specific secret, click Actions > Delete secret.
- To delete a key-value pair for a specific secret from the console,
- Go to the Secrets and configmaps page from your Code Engine Projects page.
- Click the secret that you want to change to open its page.
- From the page for the specific secret, delete the key-value pair that you want to remove.
You can also delete defined environment variables that reference secrets and configmaps. To delete a defined environment variable, from the Environment variables tab of your app, job, or function and delete the environment variable that you want to delete. After you delete a defined environment variable, be sure to click Save to save the changes to your app, job, or function. For more information, see Delete an environment variable.
Deleting secrets with the CLI
To delete a secret with the CLI, use the secret delete
command; for example,
ibmcloud ce secret delete --name myliteralsecret -f
Example output
Deleting secret myliteralsecret...
OK
You can also delete environment variables that reference secrets and configmaps from the CLI.