Skip to content
This repository has been archived by the owner on Jun 17, 2023. It is now read-only.

Improve secret management workflow #8

Closed
ilyasotkov opened this issue Dec 28, 2017 · 7 comments
Closed

Improve secret management workflow #8

ilyasotkov opened this issue Dec 28, 2017 · 7 comments
Labels

Comments

@ilyasotkov
Copy link
Collaborator

No description provided.

@ilyasotkov
Copy link
Collaborator Author

@ilyasotkov
Copy link
Collaborator Author

@ilyasotkov
Copy link
Collaborator Author

We have a working deployment for Vault in core/vault which we have tested manually. We are now up for a real-world example with Concouse, which supports pulling secrets from a Vault server natively.

@ilyasotkov
Copy link
Collaborator Author

Vault should probably be integrated with GCP KMS one way or another since owner-key.json is something we already use anyway.

hashicorp/terraform-provider-google#495

@ilyasotkov
Copy link
Collaborator Author

@ilyasotkov ilyasotkov changed the title Incorporate Vault for secrets Improve secret management workflow Jan 29, 2018
@ilyasotkov
Copy link
Collaborator Author

ilyasotkov commented Jan 29, 2018

I renamed the issue since we might now necessarily want to use Vault. There's no need to write other solutions off.

@ilyasotkov
Copy link
Collaborator Author

✅ We now support a simple solution using Google Cloud KMS and Cloud Storage buckets via the gcp-kms-secret-mgmt module

This is how it works:

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

1 participant