helm-diff
Vault
helm-diff | Vault | |
---|---|---|
8 | 160 | |
2,508 | 29,693 | |
- | 0.6% | |
8.8 | 10.0 | |
1 day ago | 1 day ago | |
Go | Go | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
helm-diff
-
Kong Gateway on AWS EKS: A Journey into Cloud-native API Management
#!/usr/bin/env bash set -euo pipefail cd "$(dirname "$0")/.." source scripts/common.sh green "Installing Kubectl" install_kubectl green "Installing helm version => ${HELM_VERSION}" install_helm green "Setting up Kong Helm Repo" helm repo add kong https://charts.konghq.com helm repo update green "Installing Helm Diff Plugin" helm plugin install https://github.com/databus23/helm-diff || true green "Setting up AWS Auth" setup_aws_auth green "Set the current namespace" kubectl config set-context --current --namespace=${KONG_NAME}-kong green "Validating VPA Config => ${KONG_NAME}-kong-vpa" kubectl diff -f ${KONG_NAME}/vpa.yaml || true if [[ "${KONG_NAME}" == prd ]]; then green "Validating Ingress => ${KONG_NAME}-kong-ingress" kubectl diff -f ${KONG_NAME}/ingress.yaml || true fi green "Validating Kong => ${KONG_NAME}" helm diff upgrade \ --install \ "${KONG_NAME}" \ kong/kong \ --namespace "${NAMESPACE}" \ -f ${KONG_NAME}/kong.yaml \ --set-file dblessConfig.config=${KONG_NAME}/declarative.yaml \ --version 2.6.3
-
Simplified Deployment: A Deep Dive into Containerization and Helm
helm plugin install https://github.com/databus23/helm-diff helm plugin install https://github.com/aslafy-z/helm-git helm plugin install https://github.com/jkroepke/helm-secrets
- difftool to generate config with only new changes
-
GKE with Consul Service Mesh
helm-diff plugin to see differences about what will be deployed.
-
Falling for Kubernetes
There's Helm plugin (https://github.com/databus23/helm-diff) that show diff results for you, for example
helm diff upgrade --namespace
- Helm Diff
- Cannot update statefulset?
-
Bitnami Sealed Secrets - How To Store Kubernetes Secrets In Git Repositories
So helm secrets is a helm plugin, not quite native. It requires the helm diff plugin as well.
Vault
- Terraform & HashiCorp Vault Integration: Seamless Secrets Management
-
Top Secrets Management Tools for 2024
HashiCorp Vault
-
Keep it cool and secure: do's and don'ts for managing Web App secrets
For a more comprehensive and robust secret management solution, get your hands on tools like GCP Secret Manager, or HashiCorp Vault. They're like the security guards of your secrets, providing a safe house, access control, and keeping logs of who’s been snooping around.
-
Kubernetes Secret Management
HashiCorp Vault is a popular tool for managing secrets in Kubernetes clusters. It offers advanced features such as secure storage, encryption, dynamic secrets generation, and integration with Kubernetes through its Kubernetes authentication method.
-
Champion Building - How to successfully adopt a developer tool
So you've just bought a new platform tool? Maybe it's Hashicorp Vault? Snyk? Backstage? You’re excited about all of the developer experience, security and other benefits you're about to unleash on your company—right? But wait…
-
AWS Secrets Manager for on-premise and other cloud accounts scaled architecture
You seem to be looking for a cross-platform solution, and https://www.vaultproject.io/ provides just that. If everything was in AWS, AWS Secret Manager might be great, but imo Vault provides much better platform-agnostic capabilities.
-
Show HN: Anchor – developer-friendly private CAs for internal TLS
https://github.com/openwrt/luci/blob/master/applications/luc...
https://developer.hashicorp.com/vault/tutorials/secrets-mana... https://github.com/hashicorp/vault :
> Refer to Build Certificate Authority (CA) in Vault with an offline Root for an example of using a root CA external to Vault.
-
The Complete Microservices Guide
Secret Management: Securely stores sensitive configuration data and secrets using tools like AWS Secrets Manager or HashiCorp Vault. Avoid hardcoding secrets in code or configuration files.
-
Horcrux: Split your file into encrypted fragments
The author of this tool basically took the Shamir code from Hashicorp Vault, which is pretty mainstream. If you're looking for a solid implementation, I would start there[0]. I wouldn't use the Shamir code from this repo, as it's an old version of the vault code using field arithmetic that doesn't run in constant time.
[0]: https://github.com/hashicorp/vault/blob/main/shamir/shamir.g...
-
OpenTF Announces Fork of Terraform
Out of curiosity, what do you mean by this? cross-cluster? they already have HA: https://github.com/hashicorp/vault/blob/v1.14.1/website/cont...
while digging up that link, I also saw one named replication: https://github.com/hashicorp/vault/blob/v1.14.1/website/cont...
What are some alternatives?
chartmuseum - helm chart repository server
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
charts - ⚠️(OBSOLETE) Curated applications for Kubernetes
sealed-secrets - A Kubernetes controller and tool for one-way encrypted Secrets
helm - The Kubernetes Package Manager
sops - Simple and flexible tool for managing secrets
k8s-platform-lcm - A faster and easier way to manage the lifecycle of applications and tools, running and living around your Kubernetes platform
etcd - Distributed reliable key-value store for the most critical data of a distributed system
chart-releaser - Hosting Helm Charts via GitHub Pages and Releases
OPA (Open Policy Agent) - Open Policy Agent (OPA) is an open source, general-purpose policy engine.
helmfile - Declaratively deploy your Kubernetes manifests, Kustomize configs, and Charts as Helm releases. Generate all-in-one manifests for use with ArgoCD.
bitwarden_rs - Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs [Moved to: https://github.com/dani-garcia/vaultwarden]