Skip to content

Commit d8ace90

Browse files
authored
Merge pull request #22128 from danielorihuela/docs/update-secrets-providers-field-name
docs: update secrets providers field name
2 parents 22ae805 + da64c0f commit d8ace90

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

src/content/docs/new-relic-control/agent-control/configuration.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -433,7 +433,7 @@ Agent Control provides a robust mechanism for managing sensitive data, such as p
433433
### Defining Secrets in Configuration
434434
To utilize secrets, define them within your Agent Control configuration YAML file by following these steps:
435435

436-
1. **Define the `secrets_providers` section:** Configure your secret providers centrally in this section. Ensure each entry corresponds to a supported provider.
436+
1. **Define the `secretsProviders` section:** Configure your secret providers centrally in this section. Ensure each entry corresponds to a supported provider.
437437
2. **Configure secret sources:** For each provider, specify one or more sources. A source includes the necessary configuration details (for example, URL, token) for Agent Control to connect to and retrieve a group of secrets.
438438
3. **Use placeholders in agent configurations:** Instead of the actual sensitive data, use a placeholder string within your agent's configuration. Agent Control automatically replaces these placeholders with the retrieved secrets during the rendering process.
439439

@@ -444,7 +444,7 @@ To utilize secrets, define them within your Agent Control configuration YAML fil
444444
The following Agent Control configuration example demonstrates how to retrieve secrets from two Vault sources within the `secrets_providers` section:
445445

446446
```yaml
447-
secrets_providers:
447+
secretsProviders:
448448
vault:
449449
sources:
450450
local-instance:

0 commit comments

Comments
 (0)