Documentation Index
Fetch the complete documentation index at: https://openmetadata-feat-feat-gkerunnermwaa.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Using External Secrets Managers
Important Note
If your OpenMetadata instance uses database-stored credentials (the default configuration), you do not need to follow this guide. The SDK will automatically retrieve and decrypt credentials. This guide is only necessary when your organization uses an external secrets manager for credential storage.⚠️ If you’re using OpenMetadata Cloud to run OpenMetadata, please refer to this guide to configure your external secrets manager before using the TestRunner API.
Why This is Required
TheTestRunner API executes data quality tests directly from your Python code (e.g., within your ETL pipelines). To connect to your data sources, it needs to:
- Retrieve the service connection configuration from OpenMetadata
- Decrypt the credentials stored in your secrets manager
- Establish a connection to the data source
- Execute the test cases
General Setup Steps
-
Contact your OpenMetadata/OpenMetadata administrator to obtain:
- The secrets manager type (AWS, Azure, GCP, etc.)
- The secrets manager loader configuration
- Required environment variables or configuration files
- Any additional setup (IAM roles, service principals, etc.)
- Install required dependencies for your secrets manager provider
- Configure environment variables with access credentials
- Initialize the SecretsManagerFactory before using TestRunner
- Configure the SDK and run your tests
Example using AWS Secrets Manager
Required Dependencies:Configuration by Provider
AWS and AWS Parameters Store
OpenMetadata’s ingestion extras:aws (e.g pip install 'openmetadata-ingestion[aws]')
SecretsManagerProvider: (one of)
SecretsManagerProvider.awsSecretsManagerProvider.managed_awsSecretsManagerProvider.aws_ssmSecretsManagerProvider.managed_aws_ssm
AWS_ACCESS_KEY_IDAWS_SECRET_ACCESS_KEYAWS_DEFAULT_REGION
Azure Key Vault
OpenMetadata’s ingestion extras:azure (e.g pip install 'openmetadata-ingestion[azure]')
SecretsManagerProvider: (one of)
SecretsManagerProvider.azure_kvSecretsManagerProvider.managed_azure_kv
AZURE_CLIENT_IDAZURE_CLIENT_SECRETAZURE_TENANT_IDAZURE_KEY_VAULT_NAME
Google Cloud Secret Manager
OpenMetadata’s ingestion extras:gcp (e.g pip install 'openmetadata-ingestion[gcp]')
SecretsManagerProvider: SecretsManagerProvider.gcp
Environment variables:
GOOGLE_APPLICATION_CREDENTIALS: path to the file with the credentials json fileGCP_PROJECT_ID
Troubleshooting
Error: “Cannot decrypt service connection”
Cause: Secrets manager not initialized or misconfigured Solution: EnsureSecretsManagerFactory is initialized before calling configure() or creating the TestRunner
Error: “Access Denied” or “Unauthorized”
Cause: Insufficient permissions to access secrets Solution:- Verify IAM role/service principal has correct permissions
- Check credentials are valid and not expired
- Ensure correct region/vault name is specified
Error: “Module not found” for secrets manager
Cause: Missing dependencies for your secrets manager Solution: Install required extras:Tests Fail with Connection Errors
Cause: Credentials not properly decrypted or secrets manager misconfigured Solution:- Verify secrets manager provider matches your OpenMetadata backend configuration
- Test credential access independently (e.g., using AWS CLI, Azure CLI, gcloud)
- Check network connectivity to secrets manager service
- Enable debug logging to see detailed error messages:
Contact Your Administrator
If you’re unsure about:- Which secrets manager your organization uses
- Required environment variables or configuration
- Access credentials or IAM roles
- Permissions needed