Securing secrets (variables) before adding to Github

This page summarizes the projects mentioned and recommended in the original post on /r/kubernetes

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
  • terraform-vault

  • I've recently installed Hashicorp vault on my k8s@homelab. I'm pretty "lazy" and want literally everything as a code. That includes passwords that will be injected into the vault. I've decided to use Terraform to populate the vault but now... how to encrypt the TFvars and keep em in GH? I'm confussed. Using SOPS/pass/any-other-mechanism for encrypting passwords that shall be encrypted in vault sounds weird, but I don't see any other way. How you guys handle it?

  • argocd-vault-replacer

    An Argo CD plugin to replace placeholders in Kubernetes manifests with secrets stored in Hashicorp Vault.

  • I use argocd with argocd-vault-replacer: https://github.com/crumbhole/argocd-vault-replacer

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts