Jonas De Beukelaer
01/17/2022, 12:29 PMdagster-k8s/config
tag to attach them)
c. also currently it means I would need to reload dagit each time I create a new job requiring new secrets, instead of just reloading the relevant dagster-user-deployment
3. Or, since my secrets currently live in AWS Secrets Manager - could it make sense to simply create an op to pull these as part of the graph? I think this might work well locally too. Hmm writing this out may have helped me find a solution 😄 Still interested to hear the dagster team’s take on thisAnatoly Laskaris
01/17/2022, 1:35 PMAlex Service
01/17/2022, 2:15 PMdirenv
to be sufficient so far. My flow is simply:
• create .envrc
with whatever secrets/paths to secrets I need (export WHATEVER=/path/to/whatever
)
• If using docker, pass env vars through a docker-compose.yml
so spin-up and clean-up are easy
• For deployments, rely on my devops team and put the secrets wherever they tell me lolJonas De Beukelaer
01/17/2022, 4:48 PMAnatoly Laskaris
01/17/2022, 5:11 PMdaniel
01/17/2022, 6:58 PMJonas De Beukelaer
01/18/2022, 9:17 AMops:
send_to_endpoint:
config:
api_endpoint: 'api.alchera.tech/v1.0'
api_key:
env: MY_ENV_VAR
Also there is one inaccuracy in my initial message - in k8s the dagit pod is not the one expecting the env var to be present, it’s the user-deployment grpc server instead (so my point 2.c. is not an issue)daniel
01/18/2022, 1:51 PM