This page is a guide to adding your credentials to AWS Secrets Manager. Adding credentials to Secrets Manager ensures that, when using a you are hosting in your own cloud infrastructure, your credentials aren’t passed to the Matillion control plane, keeping your secrets in your own infrastructure. Even when a pipeline refers to a secret, it’s resolved at run time by the , with only references to the secret being stored in .Documentation Index
Fetch the complete documentation index at: https://docs.maia.ai/llms.txt
Use this file to discover all available pages before exploring further.
Locate your Maia runner credentials
- Log in to .
- In the left navigation, click s. Then, select Runners from the menu.
- Select a . If you haven’t created one yet, read Create a .
- In Runner details, scroll down to Credentials.
- Click Reveal credentials.
- Note the revealed client_id and client_secret.
Add your credentials to AWS Secrets Manager
- Log in to the AWS Console.
- Once logged in, type “Secrets Manager” in the search bar and click Secrets Manager.
- Click Store a new secret.
- Choose the tile labelled Other type of secret.
-
Add two key:value pairs:
- client_id: The value of the client ID located as described above.
- client_secret: The value of the client secret located as described above.
- Click Next.
- Name the secret and provide a secret description. Click Next.
- Click Next again unless you wish to configure rotation settings.
- Review the secret and click Store. You’ll return to Secrets. Refresh the page.
Retrieve the ARN of your new secret
- While in the Secrets dashboard of AWS Secrets Manager, click the name of your new secret.
- In the Secret details container, copy the Secret ARN and save this value for later to reference it in the task definition.
