[Tracking Issue] Secret management at scale #156
Labels
No labels
Compat/Breaking
Difficulty/Architectural
Difficulty/Easy
Difficulty/Hard
Help Wanted
Kind/Bug
Kind/Documentation
Kind/Enhancement
Kind/Feature
Kind/Testing
Priority/Critical
Priority/High
Priority/Low
Priority/Medium
Reviewed/Confirmed
Reviewed/Duplicate
Reviewed/Invalid
Reviewed/Won't Fix
Security
Silenced Alert
Status/Abandoned
Status/Blocked
Status/Need More Info
Status/Postponed
Tracking Issue
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: afnix/infra#156
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Here's the list of things we need to convert to our Vault server.
OfBorg done in https://git.lix.systems/the-distro/infra/pulls/162.
Next is PostgreSQL for Hydra. Terraform S3 requires a privileged sort of API to emit scoped keys which we do not have right now. With Ceph RGW, that's very feasible.
Monitoring done in
a1f2c9209f
and72e2c8f93b
; thanks to @k900 !Daily operations roles done in
85c71e7bd0
. Now we need developer experience to connect via SSO and stuff and some testing.I will set the S3 access key secret now and write a proper shell for operators.
Terraform S3 fixed in #205.