Global secrets
This article refers to Platform v3.1.0. The current Platform version is v3.2.0.
Overview
The Global Secrets card provides a centralized interface to view and edit global secrets available at the cluster level. These secrets are user-defined and accessible to any application deployed within the cluster, ensuring consistent and secure configuration management across all nodes.
Secrets are variables stored securely within the system, encrypted and accessible only to authorized users. They typically contain critical security information such as passwords, tokens, certificates, and keys.

Global Secrets Card
Global Secrets Card Features
- Displays the total number of global secrets currently defined.
- Shows recent activity and status indicators such as errors or pending changes.
- Provides quick access buttons to add new secrets or manage existing ones.
- Synchronizes secrets across all cluster nodes, making them accessible to all deployed applications.
Add or Edit Secret
Users can add new secrets or edit existing ones through an intuitive modal interface:
- When adding a secret, the user assigns a name and a value.
- When editing, only the value can be modified; the secret's name remains fixed.
- Both adding and editing support the option to Add file as a secret, allowing the secret's value to be set from the contents of a file.
Assigning a secret's value via a file is especially useful for certificates or keys that are stored in file formats.
Only users with administrator or supervisor roles can view the previously assigned secret values during editing. Users with reader or editor roles cannot see secret values for security reasons.

Global Secrets Card's Actions
Add/Edit Secret Modal Features
- Name field (editable only when adding a new secret).
- Toggle to add a file as the secret value.
- Password-style masked input for secret values.
- Visibility toggle for secret value when permitted.
- Save and cancel actions.

Edit Secret
More Actions
The Global Secrets card also supports bulk operations to streamline secret management:
- Upload a
.txtfile directly from the user's device to define multiple secrets in bulk. - Download all existing secrets as a JSON file for backup or migration purposes.
- Delete all secrets defined in the system with a single action.
These operations help maintain synchronization of secrets across all cluster nodes, ensuring that all applications have consistent access to the latest secret data.