GCP Secret Manager
Prerequisites
- A GCP project with Secret Manager API enabled
- Application Default Credentials configured on the ev API server
- A service account with the
Secret Manager Adminrole (or equivalent)
Step 1: Enable the API
Step 2: Set Up Credentials
The ev API server needs GCP credentials. Options:
Application Default Credentials (local dev):
Service Account (production):
Workload Identity (GKE): Attach the service account to your Kubernetes pod.
Step 3: Connect
Step 4: Import Existing Secrets
How Secrets Are Stored
Each secret is stored as a separate GCP secret with the naming convention:
For example, with prefix myapp and environment prod:
Each secret has versions managed by GCP. ev always writes a new version and reads the latest.
Limitations
- No rollback: ev doesn't store values for external backends
- No E2E encryption: Secrets stored as plaintext in GCP
- GCP credentials required: The API server needs Application Default Credentials or a service account key