-
Notifications
You must be signed in to change notification settings - Fork 244
ESC Secrets Rotation Blog #14088
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ESC Secrets Rotation Blog #14088
Conversation
Your site preview for commit 6fd6be8 is ready! 🎉 http://www-testing-pulumi-docs-origin-pr-14088-6fd6be87.s3-website.us-west-2.amazonaws.com. |
|
||
With Today’s launch, we support AWS IAM user credential rotation with many more databases and cloud integrations on the way. | ||
|
||
## How to Use ESC Rotated Secrets |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does it make sense to create a small pulumi program that creates the required resources for demo? We could create the iam user, the managing role, and use the pulumi-service provider to create the two esc environments that reference them...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we can. We can say, "if you are a Pulumi IaC user, you can configure all of them using the example program linked. "
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This would be super cool!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Related, thoughts on whether we can write a policy that will find existing secrets that don't have a rotation policy attached to them?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
here is a rough draft of a demo program: https://github.com/pulumi/esc-examples/pull/4/files#diff-79cfb8d111dbf1322eec69e9879d8970e4d7b49c0122afaf96d899cb6fe349da
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Related, thoughts on whether we can write a policy that will find existing secrets that don't have a rotation policy attached to them?
I was led to believe you had volunteered to write one! 😉
I think we should be able to do it. We're going to extend the rotator to add a tag to the user it manages, which might be a way to cheat and make writing a policy easier... 🤔
maybe consider adding a banner on secret-rotation-with-iac blog post with a link to this one? like "esc now supports this natively!" or something? |
Co-authored-by: Claire <213631+nyobe@users.noreply.github.com>
Your site preview for commit e252469 is ready! 🎉 http://www-testing-pulumi-docs-origin-pr-14088-e2524692.s3-website.us-west-2.amazonaws.com. |
Your site preview for commit df1a107 is ready! 🎉 http://www-testing-pulumi-docs-origin-pr-14088-df1a1075.s3-website.us-west-2.amazonaws.com. |
To-do