Your data stack is solid until someone needs a database credential fast, and you realize it’s buried in Slack threads. That’s how secrets leak. The smarter move is storing them in GCP Secret Manager and letting Redash fetch exactly what it needs — no screenshots, no panic, no manual updates at midnight.
GCP Secret Manager is Google Cloud’s vault for API keys, connection strings, and tokens. It handles encryption, versioning, and fine-grained IAM controls. Redash, on the other hand, is your query and dashboard brain. It connects to data sources, visualizes results, and powers decision-making. When you tie the two together, Redash becomes both insightful and secure.
Here’s the logic behind the integration: Redash must authenticate to Google Cloud using a service account. That account has permissions only to read specific secrets in GCP Secret Manager, not to modify or list them. Redash loads the secret at runtime, applies it to database connections, and never persists the value to disk. Access scopes do the heavy lifting, and IAM auditing keeps watch over every request.
A good setup means defining separate secrets for each Redash data source. Rotate them in GCP every 90 days, and use roles like roles/secretmanager.secretAccessor for minimal exposure. Avoid giving Redash project-level privileges. If something looks off in the logs, check Cloud Audit Logs and confirm which identity fetched the secret. Usually, the culprit is misconfigured OAuth or an old service account token.
Quick answer:
To connect GCP Secret Manager with Redash, create a secret in Google Cloud, grant Redash’s service account “Secret Accessor” rights, and reference the secret name in Redash’s environment configuration. Redash then retrieves the value securely at startup, keeping credentials out of config files.