Skip to content

ESC Secrets Rotation Blog #14088

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Feb 19, 2025
Merged

ESC Secrets Rotation Blog #14088

merged 3 commits into from
Feb 19, 2025

Conversation

arunkumar611
Copy link
Member

To-do

  • GIF
  • Link to rotated secrets docs

@pulumi-bot
Copy link
Collaborator


With Today’s launch, we support AWS IAM user credential rotation with many more databases and cloud integrations on the way.

## How to Use ESC Rotated Secrets
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does it make sense to create a small pulumi program that creates the required resources for demo? We could create the iam user, the managing role, and use the pulumi-service provider to create the two esc environments that reference them...

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we can. We can say, "if you are a Pulumi IaC user, you can configure all of them using the example program linked. "

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This would be super cool!

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Related, thoughts on whether we can write a policy that will find existing secrets that don't have a rotation policy attached to them?

Copy link
Contributor

@nyobe nyobe Feb 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Related, thoughts on whether we can write a policy that will find existing secrets that don't have a rotation policy attached to them?

I was led to believe you had volunteered to write one! 😉

I think we should be able to do it. We're going to extend the rotator to add a tag to the user it manages, which might be a way to cheat and make writing a policy easier... 🤔

@nyobe
Copy link
Contributor

nyobe commented Feb 19, 2025

maybe consider adding a banner on secret-rotation-with-iac blog post with a link to this one? like "esc now supports this natively!" or something?

Co-authored-by: Claire <213631+nyobe@users.noreply.github.com>
@pulumi-bot
Copy link
Collaborator

@pulumi-bot
Copy link
Collaborator

@arunkumar611 arunkumar611 merged commit e38afba into master Feb 19, 2025
16 checks passed
@arunkumar611 arunkumar611 deleted the esc-secrets-rotation-blog branch February 19, 2025 23:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants