Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Secrets management through vaults #3709

Open
1 task done
vipasane opened this issue Sep 7, 2023 · 0 comments
Open
1 task done

Secrets management through vaults #3709

vipasane opened this issue Sep 7, 2023 · 0 comments
Labels
area:deployment related to how uptime kuma can be deployed feature-request Request for new features to be added

Comments

@vipasane
Copy link

vipasane commented Sep 7, 2023

⚠️ Please verify that this feature request has NOT been suggested before.

  • I checked and didn't find similar feature request

🏷️ Feature Request Type

Other

🔖 Feature description

Transparent way to use (or synchronize) secrets such as usernames, passwords, connection strings, API keys and certificates between different vaults without the need to to have yet another copy of these values to be maintained manually locally. This store should be independent, agnostic on which node is used to run this probing task and therefore it should be rather tied to identity which is running that service(s)

Integrating services listed below would be great deal for attracting enterprise users:

  • HashiCorp Vault
  • Azure Key Vault
  • AWS Secrets Manager
  • GCP Secret Manager

Justification:
SREs rarely know or even should know production environment secrets, especially in they are automatically rotated.
Therefore there is a need to just pick up token string representing the secret from a list.

✔️ Solution

All the available secrets from single (or all available vault connections) is shown as list where user can select secret to be used. These secrets are refreshed from vaults periodically or even fetched when needed.

❓ Alternatives

Background service which will track changes in targeted (pre-configured) vaults and synchronizes changes in local encrypted cache.

📝 Additional Context

One practical example:
a .net way of tracking configuration changes https://learn.microsoft.com/en-us/azure/azure-app-configuration/reload-key-vault-secrets-dotnet

@vipasane vipasane added the feature-request Request for new features to be added label Sep 7, 2023
@CommanderStorm CommanderStorm added the area:deployment related to how uptime kuma can be deployed label Dec 5, 2023
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
area:deployment related to how uptime kuma can be deployed feature-request Request for new features to be added
Projects
None yet
Development

No branches or pull requests

2 participants