(no title)
slaughtr | 1 year ago
What are the advantages to a configuration like this? Seems the HTTP interface with non-encrypted cache and separate agent situation isn’t something secure enough to satisfy most companies these days.
slaughtr | 1 year ago
What are the advantages to a configuration like this? Seems the HTTP interface with non-encrypted cache and separate agent situation isn’t something secure enough to satisfy most companies these days.
gurchik|1 year ago
Chamber uses SSM Parameter Store, which for many cases is similar, but some people might have a preference for Secrets Manager. For example, a team might like the automatic RDS password rotation for Secrets Manager and decide to put everything there for consistency.
For Doppler, well maybe someone doesn't want to pay for it, or they'd rather control access to their secrets via IAM instead of through a separate tool.
SamuelAdams|1 year ago
https://github.com/Kralizek/AWSSecretsManagerConfigurationEx...
Normally Boto uses the current account context to get secrets, but if we run a lambda as a local build, it uses this library to pull secrets from the actual dev AWS account.
This makes it easier to onboard new developers, reduces problems of figuring out what secrets to get for each lambda, etc.
Also if secrets are rotated in dev, local stacks get them automatically.
I am curious to see if this tool is remarkably different.
banku_brougham|1 year ago
drodgers|1 year ago
mac-chaffee|1 year ago
> The Secrets Manager Agent provides compatibility for legacy applications that access secrets through an existing agent or that need caching for languages not supported through other solutions.
globular-toast|1 year ago
ak217|1 year ago
That's a pretty thorough misunderstanding of the value that secrets management services provide. We can start with the idea of never storing secrets in files.
I think most companies also understand the difference between plain HTTP localhost loopback and transmitting secrets in plaintext over the network. There are many services that rely on localhost loopbacks for handling all kinds of sensitive data.
Chamber is great but generally relies on transmitting secrets via environment variables to the enclosed process and assumes that they will remain valid for the lifetime of that process. Part of the point of this tool is to provide a secrets cache with a TTL.
lukeschlather|1 year ago