From 27c64405c360cf118e30dc3e139fd2e7c6024bfb Mon Sep 17 00:00:00 2001 From: Nora Date: Mon, 9 Sep 2019 17:07:58 -0700 Subject: [PATCH] Updated index page --- content/v2.0/security/secrets/_index.md | 24 +++++++++++++++++++++++- 1 file changed, 23 insertions(+), 1 deletion(-) diff --git a/content/v2.0/security/secrets/_index.md b/content/v2.0/security/secrets/_index.md index 030970e8f..4e34bc970 100644 --- a/content/v2.0/security/secrets/_index.md +++ b/content/v2.0/security/secrets/_index.md @@ -1,5 +1,5 @@ --- -title: Store secrets +title: Store and view secrets description: v2.0/tags: [secrets, security] menu: @@ -12,3 +12,25 @@ There are two options for storing secrets with InfluxDB: - By default, secrets are Base64-encoded and stored in the InfluxDB embedded key value store, [BoltDB](https://github.com/boltdb/bolt). - You can also set up Vault to store secrets. For details, see [Store secrets in Vault](/v2.0/security/secrets/use-vault). + +## Use secrets in a query +Import the `influxdata/influxd/secrets` package and use the `secrets.get()` function +to populate sensitive data in queries with secrets from your secret store. + +```js +import "influxdata/influxdb/secrets" +import "sql" + +username = secrets.get(key: "POSTGRES_USERNAME") +password = secrets.get(key: "POSTGRES_PASSWORD") + +sql.from( + driverName: "postgres", + dataSourceName: "postgresql://${username}:${password}@localhost", + query:"SELECT * FROM example-table" +) +``` + +## Add, list, and delete secrets + +See [Manage secrets](/v2.0/security/secrets/manage-secrets).