- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`ancestors
Type: UNORDERED_LIST_STRING
annotations
Type: MAP_STRING_STRING
Provider name: annotations
Description: Optional. Custom metadata about the secret. Annotations are distinct from various forms of labels. Annotations exist to allow client tools to store their own state information without requiring a database. Annotation keys must be between 1 and 63 characters long, have a UTF-8 encoding of maximum 128 bytes, begin and end with an alphanumeric character ([a-z0-9A-Z]), and may have dashes (-), underscores (_), dots (.), and alphanumerics in between these symbols. The total size of annotation keys and values must be less than 16KiB.
create_time
Type: TIMESTAMP
Provider name: createTime
Description: Output only. The time at which the Secret was created.
customer_managed_encryption
Type: STRUCT
Provider name: customerManagedEncryption
Description: Optional. The customer-managed encryption configuration of the regionalized secrets. If no configuration is provided, Google-managed default encryption is used. Updates to the Secret encryption configuration only apply to SecretVersions added afterwards. They do not apply retroactively to existing SecretVersions.
kms_key_name
STRING
kmsKeyName
global
. The expected format is projects/*/locations/*/keyRings/*/cryptoKeys/*
.etag
Type: STRING
Provider name: etag
Description: Optional. Etag of the currently stored Secret.
expire_time
Type: TIMESTAMP
Provider name: expireTime
Description: Optional. Timestamp in UTC when the Secret is scheduled to expire. This is always provided on output, regardless of what was sent on input.
labels
Type: UNORDERED_LIST_STRING
name
Type: STRING
Provider name: name
Description: Output only. The resource name of the Secret in the format projects/*/secrets/*
.
organization_id
Type: STRING
parent
Type: STRING
project_id
Type: STRING
project_number
Type: STRING
replication
Type: STRUCT
Provider name: replication
Description: Optional. Immutable. The replication policy of the secret data attached to the Secret. The replication policy cannot be changed after the Secret has been created.
automatic
STRUCT
automatic
customer_managed_encryption
STRUCT
customerManagedEncryption
kms_key_name
STRING
kmsKeyName
global
. The expected format is projects/*/locations/*/keyRings/*/cryptoKeys/*
.user_managed
STRUCT
userManaged
replicas
UNORDERED_LIST_STRUCT
replicas
customer_managed_encryption
STRUCT
customerManagedEncryption
kms_key_name
STRING
kmsKeyName
global
. The expected format is projects/*/locations/*/keyRings/*/cryptoKeys/*
.location
STRING
location
"us-east1"
.resource_name
Type: STRING
rotation
Type: STRUCT
Provider name: rotation
Description: Optional. Rotation policy attached to the Secret. May be excluded if there is no rotation policy.
next_rotation_time
TIMESTAMP
nextRotationTime
rotation_period
STRING
rotationPeriod
tags
Type: UNORDERED_LIST_STRING
topics
Type: UNORDERED_LIST_STRUCT
Provider name: topics
Description: Optional. A list of up to 10 Pub/Sub topics to which messages are published when control plane operations are called on the secret or its versions.
name
STRING
name
projects/*/topics/*
. For publication to succeed, the Secret Manager service agent must have the pubsub.topic.publish
permission on the topic. The Pub/Sub Publisher role (roles/pubsub.publisher
) includes this permission.ttl
Type: STRING
Provider name: ttl
Description: Input only. The TTL for the Secret.
version_destroy_ttl
Type: STRING
Provider name: versionDestroyTtl
Description: Optional. Secret Version TTL after destruction request This is a part of the Delayed secret version destroy feature. For secret with TTL>0, version destruction doesn’t happen immediately on calling destroy instead the version goes to a disabled state and destruction happens after the TTL expires.