teller
kubernetes-external-secrets
teller | kubernetes-external-secrets | |
---|---|---|
9 | 1 | |
2,544 | 1,635 | |
1.2% | - | |
6.2 | 8.5 | |
9 days ago | about 3 years ago | |
Go | JavaScript | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
teller
- Teller: Universal secret manager, never leave your terminal to use secrets
-
How do you protect your secret keys in your local computer?
I use a teller to pass secrets to my apps/commands, secret values are stored in OSX keychain, .env file or AWS Vault. It depends on project / environment context.
-
What do you guys use to manage .env files?
Have you seen Teller? https://tlr.dev it’s part of CNcF.
-
Which Tools Do You use daily for Golang development?
Air for live reloading https://github.com/cosmtrek/air, Teller for env and secret manager https://tlr.dev, Okteto cloud development https://www.okteto.com
-
I created an open source secrets manager and Y Combinator just invested in it!
This is similar to teller? https://github.com/tellerops/teller
-
Need to find an open source secrets scanner solution. any suggestions from personal use only?
I also found this one: https://github.com/tellerops/teller has anyone used it?
- Hyperstack - a new open source Node.js web framework with everything included
-
What are some of the credential scanning tools
You could use Spectral (https://spectralops.io) (disclaimer: I'm one of the founders), And if you're looking to scan credentials originating from your vaults and keystores you could use Teller, which is an open source vault scanner and secrets hub for developers that I've built: https://github.com/SpectralOps/teller
- teller - a universal secret manager for developers built with Go
kubernetes-external-secrets
-
Building cloud native apps: Config and Toggles
If you host your Kubernetes cluster in a cloud then I would strongly encourage you to use godaddy/kubernetes-external-secrets project to sync your Kubernetes secrets with external secrets services. kubernetes-external-secrets supports the following backends: AWS Systems Manager Parameter Store, Hashicorp Vault, Azure Key Vault, Google Secret Manager, and Alibaba Cloud KMS Secret Manager.
What are some alternatives?
k8s-vault-webhook - A k8s vault webhook is a Kubernetes webhook that can inject secrets into Kubernetes resources by connecting to multiple secret managers
argocd-vault-plugin - An Argo CD plugin to retrieve secrets from Secret Management tools and inject them into Kubernetes secrets
gitleaks - Protect and discover secrets using Gitleaks 🔑
kube-secret-syncer - A Kubernetes operator to sync secrets from AWS Secrets Manager
infisical - ♾ Infisical is the open-source secret management platform: Sync secrets across your team/infrastructure and prevent secret leaks.
kube-secrets-init - Kubernetes mutating webhook for `secrets-init` injection
env-vault - Launch a program with environment variables populated from an encrypted file
vanishing-keys - Vanishing Keys is the public implementation of how Authress provides One Time Secrets
levant - An open source templating and deployment tool for HashiCorp Nomad jobs
migrator - Super fast and lightweight DB migration & evolution tool written in Go
hugo-quick-start - Hugo Quick Start on Render
vkv - vkv enables you to list, compare, move, import, document, backup & encrypt secrets from a HashiCorp Vault KV engine