helm-teller
Allows you to manage configuration and secrets from multiple provider while masking the secrets at the deployment (by tellerops)
teller
Cloud native secrets management for developers - never leave your command line for secrets. (by tellerops)
Our great sponsors
helm-teller | teller | |
---|---|---|
5 | 9 | |
72 | 2,541 | |
- | 3.1% | |
0.0 | 6.5 | |
over 1 year ago | 6 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
helm-teller
Posts with mentions or reviews of helm-teller.
We have used some of these posts to build our list of alternatives
and similar projects.
- Helm-teller
- Plugin that allows you to manage deployment configuration and secrets
-
Kubernetes Plugin
https://github.com/SpectralOps/helm-teller
- GitHub - SpectralOps/helm-teller: Plugin that allows you to manage deployment configuration and secrets from multiple providers securely wit
- Plugin that allows you to manage deployment configuration and secrets from multiple providers securely with Teller
teller
Posts with mentions or reviews of teller.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2024-01-17.
- Teller: Universal secret manager, never leave your terminal to use secrets
-
How do you protect your secret keys in your local computer?
I use a teller to pass secrets to my apps/commands, secret values are stored in OSX keychain, .env file or AWS Vault. It depends on project / environment context.
-
What do you guys use to manage .env files?
Have you seen Teller? https://tlr.dev it’s part of CNcF.
-
Which Tools Do You use daily for Golang development?
Air for live reloading https://github.com/cosmtrek/air, Teller for env and secret manager https://tlr.dev, Okteto cloud development https://www.okteto.com
-
I created an open source secrets manager and Y Combinator just invested in it!
This is similar to teller? https://github.com/tellerops/teller
-
Need to find an open source secrets scanner solution. any suggestions from personal use only?
I also found this one: https://github.com/tellerops/teller has anyone used it?
- Hyperstack - a new open source Node.js web framework with everything included
-
What are some of the credential scanning tools
You could use Spectral (https://spectralops.io) (disclaimer: I'm one of the founders), And if you're looking to scan credentials originating from your vaults and keystores you could use Teller, which is an open source vault scanner and secrets hub for developers that I've built: https://github.com/SpectralOps/teller
- teller - a universal secret manager for developers built with Go