Skip to content

Add write-only arguments for sensitive datadog_integration_* attributes #2991

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
chris-pinola-rf opened this issue Apr 28, 2025 · 0 comments

Comments

@chris-pinola-rf
Copy link
Contributor

What resources or data sources are affected?

  • datadog_integration_azure (client_secret)
  • datadog_integration_cloudflare_account (api_key)
  • datadog_integration_confluent_account (api_secret)
  • datadog_integration_fastly_account (api_key)
  • datadog_integration_gcp (private_key)
  • datadog_integration_opsgenie_service_object (opsgenie_api_key)
  • datadog_integration_pagerduty (api_token)

Feature Request

Terraform v1.11 introduced write-only arguments which support ephemeral values. Ephemeral values are a great way to keep sensitive values out of Terraform state files. Adding a write-only argument to the datadog_integration_* resources would be very helpful for the various API keys/tokens/secrets involved in provisioning Datadog integrations. This would help to prevent leaking those secrets in Terraform state files.

My intended use case is to eventually be able to fetch a secret from an instance of Azure KeyVault via the ephemeral key_vault_secret resource and pass it to a write-only argument on the datadog_integration_cloudflare_account resource to define the API token.

References

#2916 is about exposing Datadog-originated secrets via ephemeral resources, whereas this request is about enabling the Datadog Terraform provider to receive ephemeral resources from other providers.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant