GCP Secrets Manager

Create and manage Google Cloud secrets in DuploCloud

DuploCloud integrates with GCP Secrets Manager to help you securely store and manage sensitive information such as API keys, credentials, and tokens. Secrets can be created and managed directly from the DuploCloud Portal and are automatically provisioned to your GCP environment, inheriting GCP’s native encryption and access control policies.

Adding a Secret

  1. In the DuploCloud Portal, navigate to Cloud Services -> Secrets.

  2. Click Add. The Add Google Secret pane displays.

    Add Google Secret pane in the DuploCloud Portal
  3. Complete the following fields:

Name

Provide a name for the secret which will be the identifier in DuploCloud and GCP.

Secret Value Type

Select the secret format (String or JSON).

Secret Value

Enter the actual secret you want to store securely.

Labels

Enter optional key-value pairs to help categorize or manage the secret.

Replication Type

Choose how GCP replicates the secret: Automatic (managed by Google) or User Managed (you specify the regions).

  1. Click Submit to create the secret. The secret is created in CGP Secrets Manager and displays on the Secrets page in the DuploCloud Portal.

    Secrets page in the DuploCloud Portal

Viewing Secrets

After creating a secret, view its details directly from the DuploCloud Portal.

  1. In the DuploCloud Portal, navigate to Cloud Services -> Secrets.

  2. Click on the secret name in the NAME column to open the details page.

  3. Select the Details or YAML tab to review the secret's metadata, value, labels, and configuration.

Details tab for the app-secret secret

Secret values may be masked depending on your access level.

Managing Secrets

View, update, or delete existing secrets using the actions menu in the DuploCloud Portal.

  1. In the DuploCloud Portal, navigate to Cloud Services -> Secrets.

  2. Click the menu icon () in the row of the secret you want to manage.

    Secrets page with menu options highlighted
  3. Choose from the available actions:

View

Open the secret’s data and metadata in JSON format.

Update

Modify the secret’s value or labels.

Delete

Permanently remove the secret.

Last updated

Was this helpful?