Skip to main content

Key Vault Secrets Reference

The platform uses Azure Key Vault with External Secrets Operator. Secrets are synced into Kubernetes as needed.

Auto-created by Install Script

These can be generated and pushed by the install script (see Scripts Reference):

Secret NameDescription
azure-postgres-master-passwordPassword for application database user
bh-kcadminpwdKeycloak admin console password
bh-kcdbpwdKeycloak database user password
bh-app-user-passwordBigHammer app user password
bh-temp-tenant-user-passwordTemporary tenant user password
bh-rabbitmq-passwordRabbitMQ admin password
bh-redis-passwordRedis password
bh-catalog-decryption-keyCatalog decryption key (base64)

Customer-provided Secrets

You must provision these in Key Vault before deployment:

Secret NameDescription
bh-client-secretAzure AD app client secret (Workload Identity / Key Vault access)
bh-github-tokenGitHub personal access token
bh-aws-access-keyAWS access key (if using AWS integration)
bh-aws-secret-access-keyAWS secret key
bh-oauth-tokenOAuth token for audit/API
bh-langchain-api-keyLangChain API key
azure-storage-account-nameAzure Storage account name
azure-storage-account-keyAzure Storage account key
wildcard-dev-az-bighammer-crtPEM TLS certificate
wildcard-dev-az-bighammer-keyPEM TLS private key
bh-postgres-ssl-certPostgreSQL SSL CA certificate (PEM)
bh-keycloak-grant-typeKeycloak grant type (e.g. password)
license-catalogLicense file content
bh-azure-eks-devPublic key for license verification

Creating Secrets in Key Vault

Use Azure CLI to add secrets:

# Example (replace placeholders)
az keyvault secret set --vault-name <YOUR_KEY_VAULT_NAME> \
--name <SECRET_NAME> \
--value "<SECRET_VALUE>"

For file-based secrets (e.g. TLS certificate):

az keyvault secret set --vault-name <YOUR_KEY_VAULT_NAME> \
--name wildcard-dev-az-bighammer-crt \
--file /path/to/cert.pem

References