Loading...
Loading...
Configure secret stores in Spice (environment variables, Kubernetes, AWS Secrets Manager, keyring). Use when asked to "configure secrets", "add API keys", "set up credentials", "manage passwords", "use environment variables", or "configure .env file".
npx skill4agent add spiceai/skills spice-secretsenvsecrets:
- from: <store_type>
name: <store_name>| Store | From Format | Description |
|---|---|---|
| Environment | | Environment variables + |
| Kubernetes | | Kubernetes secrets |
| AWS Secrets Manager | | AWS Secrets Manager |
| Keyring | | OS keyring (macOS Keychain, Linux, Windows) |
.env.local.envsecrets:
- from: env
name: env${ store_name:KEY_NAME }datasets:
- from: postgres:my_table
name: my_table
params:
pg_user: ${ env:PG_USER }
pg_pass: ${ env:PG_PASSWORD }
models:
- from: openai:gpt-4o
name: gpt4
params:
openai_api_key: ${ secrets:OPENAI_API_KEY }params:
mysql_connection_string: mysql://${env:USER}:${env:PASSWORD}@localhost:3306/db${ secrets:KEY }secrets:
- from: env
name: env
- from: keyring
name: keyring
datasets:
- from: postgres:my_table
name: my_table
params:
pg_user: ${ secrets:pg_user } # checks keyring first, then env
pg_pass: ${ secrets:pg_pass }<key_name>envsecrets:
- from: kubernetes:my-app-secrets
name: k8ssecrets:
- from: aws_secrets_manager
name: aws
params:
aws_region: us-east-1secrets:
- from: keyring
name: keyring
- from: env
name: env