-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SPIKE - Secret management in Helm Charts #89
Comments
FYI @WadeBarnes @i5okie |
Platform services host instances of Hashicorp Vault and Argo CD. The plan so far is to at least use Hashicorp Vault to provide better secrets management and open the door to automated key/password rotation for our services. This allows machine managed access to services. For example if we use these features on a postgres database, a developer would have to be granted permissions to get a temporal password to access the system. We are also looking into using 1Password Secrets Automation to integrate with Vault to provide better secrets management from a team perspective, allowing credentials to be updated in 1Password and automatically distributed to our various environments and platforms. |
Assigned to @i5okie |
Closing this as we're addressing in #158 |
Evaluate options for more efficient secret management in our Helm Charts (currently Traction and VC-AuthN).
Some of the options to evaluate are:
Things to consider when evaluating:
Acceptance Criteria:
Document (as part of this issue, or HackMD) the pros/cons of the above options (and potentially others not listed) so that a recommendation on what the next steps should be can be made.
The text was updated successfully, but these errors were encountered: