Documentation Index
Fetch the complete documentation index at: https://docs.reducto.ai/llms.txt
Use this file to discover all available pages before exploring further.
Authentication
Reducto on-premise should run behind your private network boundary and should be called only by trusted services. Authentication protects access to the deployment, but Reducto does not provide per-end-user authorization inside a single on-premise tenant. Review the on-prem security model before exposing Reducto to additional services or networks. Reducto can read one or more tokens used for authenticating API calls from a file. On Kubernetes, a Secret can be mounted as a file in thehttp Pod - when this Secret is updated, Kubernetes automatically updates the mounted file using an eventually-consistent approach, allowing Reducto to reload the new value without requiring a restart.
Multiple API keys can be specified by placing each key on a separate line. This enables progressive secret rotation: add the new key, roll your clients over, then remove the old key, all without downtime.
Overview
When enabled, Reducto reads the authentication secret from a mounted file specified by theAUTH_SECRET_PATH environment variable. This provides better security isolation and follows Kubernetes best practices for secret management.
Setup instructions
You can set up authentication using either manual secret creation or secret creation via Helm Chart.Option 1: Manual secret creation
1. Create a Kubernetes secret
First, create a Kubernetes secret containing your API key(s). For a single key:2. Configure Helm values
Add the following configuration to your Helm values file:Option 2: Secret creation via Helm Chart
1. Configure values for creation via Helm Chart
Add the following configuration to your Helm values file to let the Helm chart create the secret:createSecret: true you must specify apiKey
2. Deploy Reducto (for both options)
Deploy or upgrade your Reducto installation:Configuration options
| Parameter | Description | Default |
|---|---|---|
auth.secretPath.enabled | Enable file-based authentication | false |
auth.secretPath.createSecret | Create the Kubernetes secret | false |
auth.secretPath.apiKey | API key, must be specified when createSecret: true | - |
auth.secretPath.secretName | Name of the Kubernetes secret | "reducto-auth-secret" |
auth.secretPath.mountPath | Mount path for the secret file | "/etc/auth" |
auth.secretPath.filename | Filename within the secret | "secret" |
How it works
- When
auth.secretPath.enabledistrue, the Helm chart mounts the specified secret as a volume - The
AUTH_SECRET_PATHenvironment variable is automatically set to the full file path - Reducto’s authentication middleware reads all keys from the file (one per line) and authenticates API requests against any of them
- The file is monitored for changes, supporting secret rotation without restarts
- If the provided API key doesn’t match any key in the file, a 401 error is returned
Secret rotation
To rotate keys without downtime:- Add the new key on a new line alongside the existing key
- Update the Kubernetes secret (Reducto picks up the change automatically)
- Migrate your clients to use the new key
- Remove the old key from the secret
Network access
Do not expose Reducto directly to the public internet. Put the API behind an internal load balancer, private ingress, service mesh, or API gateway that matches your organization’s access policy. Restrict access to:- Reducto API endpoints, including
/job,/jobs,/upload,/cancel,/configure_webhook, and billing export endpoints - Metrics and Prometheus endpoints
- PostgreSQL, Redis, object storage, model services, and observability UIs