September 12th 2024

New

Manage Sensitive Data in Checkly With Secrets

Store, manage, and use sensitive variables securely with Checkly secrets.

You can now safely store API keys, passwords, and other sensitive data in Checkly for testing and monitoring by saving them as secrets. Secret values are non-readable by users once created, and help protect data while allowing it to be used in your checks.

Use secrets in your scripts using standard Node.js syntax: process.env.MY_SECRET or by using {{handlebars}} syntax in applicable API check fields:

If you are a monitoring as code user, you can manage your secrets through the Checkly CLI. By adding the -s flag to the existing env command, you can easily create, update, or delete secrets:

checkly env add mySecretName mySecretValue -s

You can also manage your secrets via our Terraform provider, and for fine-grained control, secrets can be defined on the global, group, or check level.

Secrets are available on all current plans, and you can start using them here.

For more information, see our documentation and join our Slack community to discuss security in monitoring and testing with other Checkly users.

Happy monitoring!