Skip to main content
Secrets are secure credentials stored within Simplismart platform that allow the platform to access external systems such as cloud accounts, container registries, model sources, or Kubernetes clusters. Secrets typically include:
  • Access keys
  • API tokens
  • Service account credentials
  • Cluster authentication details
All secrets are stored securely and are only used for the specific integrations or deployments where they are referenced.
Token-based and certificate-based authentication cannot be used together. Choose only one method.

Why secrets are used

Secrets are required to:
  • Access cloud infrastructure for cluster creation or import
  • Pull containers from private registries
  • Download models from external sources
  • Authenticate with Kubernetes clusters
Using secrets ensures:
  • Credentials are not exposed in plain text
  • Access can be centrally managed
  • Integrations can be reused across deployments

Add a Secret

1

Navigate to Secrets Management

Go to Integrations → Secrets in the Simplismart UI.
2

Initiate Secret Creation

Click the Create Secret button to open the secret creation form.
3

Define Secret Details

Enter a descriptive secret name and choose the appropriate secret type from the dropdown menu (e.g., AWS, GCP, Docker Hub, Hugging Face, Kubernetes, Generic).
4

Input Credentials

Paste the credentials in the specified JSON format into the provided text area. Refer to the sections below for examples of required structures for each secret type.
5

Save the Secret

Click Create to securely store the secret.
Once created, the secret is securely stored and available for use across your organization’s integrations and deployments.

Using Secrets

Secrets can be used in:
  • Cloud account integrations
  • Cluster creation or import
  • Container registry access
  • Model source authentication
When configuring an integration or deployment, select the relevant secret from the dropdown.

Edit Secrets

To modify an existing secret:
1

Navigate to Secrets Management

Go to Integrations → Secrets.
2

Select and Edit

Locate the secret you wish to modify from the list, then click the Edit button on the top right corner of the screen.
3

Update Credentials

Adjust the credentials in the JSON format as needed. Ensure the new credentials are valid for the secret type.
4

Save Changes

Click Save Changes to update the secret.

Cloud Credentials

Cloud credentials (often referred to as cloud secrets) enable Simplismart to interact with your cloud infrastructure for tasks such as:
  • Creating or importing Kubernetes clusters
  • Managing storage resources for model artifacts and training data
  • Deploying workloads to your cloud environment
Best Practices for Cloud Credentials When configuring cloud credentials, follow these best practices to maintain a secure and efficient environment:

Use Dedicated Accounts

Allocate a dedicated cloud account, project, or subscription specifically for Simplismart operations to isolate resources and permissions.

Apply Least Privilege

Grant only the minimum necessary permissions required for Simplismart to perform its functions. Avoid overly broad access.

Rotate Credentials Regularly

Implement a policy for periodic rotation of access keys and API tokens to reduce the risk of compromise.

Avoid Root Credentials

Never use personal or root account credentials. Always use service accounts or roles with specific, limited permissions.
The specific permissions required depend on the actions Simplismart will perform (e.g., cluster creation vs. ongoing maintenance). For initial setup, broader access might simplify configuration, which can then be refined to a more restrictive policy.

Required Permissions for Cloud Providers

Below are the recommended initial roles for integrating with major cloud providers. These roles provide sufficient permissions for Simplismart to manage resources effectively. You can refine these permissions after the initial setup.
AWS secrets allow Simplismart to create or manage EKS clusters and access storage resources.

Required Credentials

Provide the following fields in the JSON format:
  • access_key_id
  • secret_access_key

IAM Policies

  • S3 Access: Required for model storage, logs, and artifacts. Permissions: s3:ListBucket, s3:GetObject, s3:PutObject.
  • EKS Full Access (Create Cluster): Required when creating new clusters from the platform. Recommended policies: AmazonEKSClusterPolicy, AmazonEKSServicePolicy, or AdministratorAccess (recommended for initial setup).
  • EKS Maintenance Access (Import Cluster): Required when importing an existing cluster. Permissions: Node group access, cluster read/write operations, networking updates.

Best practices

  • Create a separate AWS sub-account for Simplismart.
  • Avoid using root credentials.
  • Use role-based access where possible.
AWS Credentials JSON Example
{
  "access_key_id": "<access_key>",
  "secret_access_key": "<secret_key>"
}

Container Registries

Secrets for container registries enable Simplismart to pull private container images for your deployments and model serving. Each registry type has specific credential requirements.
Docker Hub secrets are used to pull private container images from Docker Hub repositories. Use a Personal Access Token instead of your password for authentication.

Set up a personal access token

  1. Log in to Docker Hub.
  2. Go to Account Settings → Security.
  3. Create a new Access Token.
  4. Copy the token.
  5. Add it as a secret in Simplismart.

Best practices

  • Create a separate registry or organisation for Simplismart.
  • Use read-only tokens where possible.
Docker Hub Credentials JSON Example
{
  "username": "<username>",
  "password": "<personal_access_token>"
}

Model Sources

Secrets for model sources allow Simplismart to access and download private or gated models from external platforms.
Hugging Face secrets enable the download of private or gated models from the Hugging Face Hub. A Personal Access Token is required for authentication.

Set up an API key

  1. Log in to Hugging Face.
  2. Go to Settings → Access Tokens.
  3. Create a new token.
  4. Copy the token.
  5. Add it as a secret in Simplismart.

Best practices

  • Create a separate account for Simplismart.
  • Use tokens with read-only access.
  • Grant access only to required models.
Hugging Face Credentials JSON Example
{
  "token": "<access_token>"
}

Kubernetes Cluster Credentials

Kubernetes cluster credentials store the necessary authentication details to connect Simplismart to an existing Kubernetes cluster. These are used when importing clusters or deploying workloads to an imported cluster.
Use either token-based or certificate-based authentication, not both.
Kubernetes secrets are required to:
  • Import clusters into the platform
  • Authenticate API access
  • Manage deployments
** Best practices**
  • Use a dedicated cluster for Simplismart workloads.
  • Avoid sharing clusters with unrelated production systems.
  • Use a dedicated subdomain for the cluster.
To authenticate using a service account token:
Kubernetes Token JSON Example
{
  "token": "<token>",
  "server": "<server>",
  "ca_certificate": "<ca_certificate>"
}

OCI Cluster Credentials

OCI credentials enable Simplismart to securely integrate with your Oracle Cloud Infrastructure (OCI) environment. These credentials are required to import existing OCI clusters, allowing you to deploy, manage, and scale models directly on your OCI-hosted infrastructure.
Simplismart supports both token-based and certificate-based authentication for OCI clusters.
To authenticate using an OCI token:
OCI Token JSON Example
{
  "token": "<token>",
  "server": "<server>",
  "client_key": "<client_key>",
  "ca_certificate": "<ca_certificate>",
  "client_certificate": "<client_certificate>"
}

Generic Secrets

Generic secrets provide a flexible way to securely store any custom credentials or sensitive information not covered by the specific secret types above. These can include third-party API keys, custom authentication tokens, or other environment variables.

How to add a generic secret?

  1. Go to Integrations → Secrets.
  2. Click Create Secret.
  3. Select Generic Secret.
  4. Enter key-value pairs in the required JSON format.
  5. Save the secret.
Generic Secret JSON Example
{
  "KEY_NAME": "VALUE"
}