Secrets Management
This section covers all CLI commands for managing secrets used by your AI agents on Agent Cloud. Secrets allow you to securely store sensitive configuration values like API keys, database credentials, and registry authentication.
Environment Secrets
Environment secrets are key-value pairs that are securely injected as environment variables into your agent containers at runtime.
List
List all secret sets.
Usage
videosdk agent secrets list
Example Output
$ videosdk agent secrets list
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Listing Secrets
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
┌──────────────────┬─────────────────┬──────────┐
│ Name │ Secret ID │ Type │
├──────────────────┼─────────────────┼──────────┤
│ my-secrets │ sec-abc123 │ env │
│ prod-credentials │ sec-xyz789 │ env │
└──────────────────┴─────────────────┴──────────┘
✓ Secrets listed successfully
Create
Create a new secret set.
Usage
videosdk agent secrets <name> create [OPTIONS]
Options
| Option | Short | Description | Default |
|---|---|---|---|
--file | -f | Path to .env file with key=value pairs | None (interactive mode) |
--region | Region for storing secrets | None |
Example Output
$ videosdk agent secrets my-secrets create --file .env
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Creating Secret
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Secret Name: my-secrets
File: .env
Secrets to be saved:
- API_KEY: ******
- DATABASE_URL: ******
Confirm action
❯ Save secrets
Cancel
Saving secrets...
Secrets saved successfully.
✓ Secret 'my-secrets' created successfully
Examples
# Create from .env file
videosdk agent secrets my-secrets create --file .env
# Create interactively (will prompt for key-value pairs)
videosdk agent secrets my-secrets create
# Create with specific region
videosdk agent secrets my-secrets create --file .env --region in002
Add
Add new keys to an existing secret set.
Usage
videosdk agent secrets <name> add
Example Output
$ videosdk agent secrets my-secrets add
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Adding to Secret
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Adding secret...
Enter key: NEW_API_KEY
Enter value: ********
Add another secret?
❯ Yes
No
Secrets to be saved:
- NEW_API_KEY: ******
Confirm action
❯ Save secrets
Cancel
Secret added successfully.
✓ Keys added to secret 'my-secrets' successfully
Remove
Remove specific keys from a secret set.
Usage
videosdk agent secrets <name> remove
Example Output
$ videosdk agent secrets my-secrets remove
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Removing Keys from Secret
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Removing secret...
Enter key: OLD_API_KEY
Remove another key?
❯ Yes
No
Secret removed successfully.
Describe
Show details of a secret set (keys only, values are hidden).
Usage
videosdk agent secrets <name> describe
Example Output
$ videosdk agent secrets my-secrets describe
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Describing Secret
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Name my-secrets
Secret ID sec-abc123
Type env
┌──────────────────┬──────────┐
│ Key │ Value │
├──────────────────┼──────────┤
│ OPENAI_API_KEY │ ****** │
│ DATABASE_URL │ ****** │
│ SECRET_TOKEN │ ****** │
└──────────────────┴──────────┘
Delete
Permanently delete a secret set.
Usage
videosdk agent secrets <name> delete
Example Output
$ videosdk agent secrets my-secrets delete
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Deleting Secret
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
✓ Secret 'my-secrets' deleted successfully
This action is permanent and cannot be undone. All keys in the secret set will be deleted.
Image Pull Secrets
Image pull secrets store container registry credentials, allowing Agent Cloud to pull images from private registries.
Create Image Pull Secret
Create an image pull secret for private container registries.
Usage
videosdk agent image-pull-secret <name> [OPTIONS]
Arguments
| Argument | Required | Description |
|---|---|---|
name | Yes | Name for the image pull secret |
Options
| Option | Description | Default |
|---|---|---|
--region | Region for storing the secret | None |
What Happens
-
You'll be prompted for:
- Server: Registry URL (e.g.,
ghcr.io,docker.io) - Username: Registry username
- Password: Registry password or access token
- Server: Registry URL (e.g.,
-
Credentials are securely stored and can be referenced in deployments
Example Output
$ videosdk agent image-pull-secret my-registry-creds
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Creating Image Pull Secret
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Setting image pull secret...
Secret Name: my-registry-creds
Enter server url: ghcr.io
Enter username: myusername
Enter password: ********
Image pull secret set successfully.
✓ Image pull secret 'my-registry-creds' created successfully
Examples
# Create image pull secret for GitHub Container Registry
videosdk agent image-pull-secret ghcr-secret
# Create with specific region
videosdk agent image-pull-secret my-registry-creds --region in002
Using Secrets in Deployments
Once you've created secrets, you can reference them when deploying your agent:
Environment Secrets
videosdk agent deploy --image myrepo/myagent:v1 --env-secret my-secrets
Image Pull Secrets
videosdk agent deploy --image ghcr.io/myorg/myagent:v1 --image-pull-secret ghcr-secret
Combined Example
videosdk agent deploy \
--image ghcr.io/myorg/myagent:v1 \
--env-secret prod-credentials \
--image-pull-secret ghcr-secret \
--min-replica 2 \
--max-replica 10
Quick Reference
| Command | Description |
|---|---|
videosdk agent secrets list | List all secret sets |
videosdk agent secrets <name> create | Create a new secret set |
videosdk agent secrets <name> add | Add keys to a secret |
videosdk agent secrets <name> remove | Remove keys from a secret |
videosdk agent secrets <name> describe | Show secret details |
videosdk agent secrets <name> delete | Delete a secret set |
videosdk agent image-pull-secret <name> | Create registry credentials |
Best Practices
-
Use .env files for bulk creation: When you have many secrets, create a
.envfile and use--file .env -
Separate secrets by environment: Create different secret sets for development, staging, and production
-
Rotate secrets regularly: Delete and recreate secrets periodically for security
-
Use descriptive names: Name your secrets clearly (e.g.,
prod-api-keys,staging-db-creds)
Got a Question? Ask us on discord

