k8s HTTP retriever securely pass api key header #1822
-
Hi 👋🏻 ! We have an Azure Function which is our HTTP Retriever and the endpoint is protected by an API Key. This API Key is stored as sealed secret in our k8s cluster. Is it possible to reference secret in the Thanks in advance 🙏🏻 |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
Hello @tomflenner 👋 ! I just did a test on my local environment and you can add an environment variable that looks like Would it work for your use case? EDIT: You can now override anything that is in an array thanks to this PR #1902 |
Beta Was this translation helpful? Give feedback.
Hello @tomflenner 👋 !
I am not super familiar with how sealed secret works but if you can use them as environment variables you can mount your API key in the HTTP header of your HTTP retriever inside the relay proxy.
I just did a test on my local environment and you can add an environment variable that looks like
RETRIEVER_HEADERS_AUTHORIZATION=Bearer xxx
when starting your container and the header will be added to every HTTP calls made by the HTTP retriever.Would it work for your use case?
EDIT: You can now override anything that is in an array thanks to this PR #1902