Console terminology: In the Maverics Console, Orchestrator instances and
configuration delivery are managed through Deployments. When working directly
with YAML, configuration is managed as files delivered via the
-config flag or
MAVERICS_CONFIG environment variable.Overview
When configured with the Secret File provider, the Orchestrator reads secret values from a YAML file at startup. Each key in the file maps to a secret that can be referenced in the Orchestrator configuration using angle bracket syntax. The file is read once at startup — changes to the file require restarting the Orchestrator.Use Cases
- Local development — use a secrets file during development without requiring an external vault or cloud credentials
- Testing and CI/CD — provide test secrets via a file for automated test runs
- Quick prototyping — get started with the Orchestrator quickly before configuring a production secret provider
Configuration
Secret providers are not configured in YAML. They are set via theMAVERICS_SECRET_PROVIDER environment variable or the -secretProvider CLI flag.
Configuration via Environment Variable
The
secretfile:// URL uses three forward slashes for an absolute path:
secretfile:// (scheme) + /path/to/file (absolute path). For example,
secretfile:///etc/maverics/secrets.yaml.Configuration via CLI Flag
Secrets File Format
The secrets file is a YAML file with a top-levelsecrets key containing flat key-value pairs:
Referencing Secrets in YAML
Once the secret provider is configured, reference secrets in your Orchestrator YAML configuration using angle bracket syntax. The key in the angle brackets maps directly to the key name under thesecrets key in the file:
Configuration Reference
URL Structure
URL Parameters
| Parameter | Required | Description |
|---|---|---|
| File path | Yes | Absolute path to the YAML secrets file (e.g., /etc/maverics/secrets.yaml) |
Troubleshooting
“file not found” when starting the Orchestrator Verify the file path is correct and uses an absolute path. Thesecretfile:// URL requires three forward slashes for absolute paths (e.g., secretfile:///etc/maverics/secrets.yaml).
Secrets not resolving in YAML configuration
Ensure the angle bracket syntax matches the key names under the secrets key in the file. The key in <key> must match exactly.
Permission denied reading the secrets file
Ensure the Orchestrator process has read access to the secrets file. Check file permissions with ls -la /path/to/secrets.yaml.