Комментарии:
Very informative. Thanks
ОтветитьThis work is compelling. A book I read with analogous ideas was incredibly eye-opening. "AWS Unleashed: Mastering Amazon Web Services for Software Engineers" by Harrison Quill
ОтветитьNice one.
ОтветитьSo what I get here is we do a custom glue connection and link it to the jar file secrets manager generates? Then use that connector in either studio or data brew?
ОтветитьThis was a great walk through thank you!
ОтветитьDo we have Secrets manager service for Android SDK?
Ответитьamazing job,man
Ответитьwatch on 1.25x speed
ОтветитьHow can i limit access to aws secrets manager for the iam users.
ОтветитьThanks so much!
Ответитьerror: Missing credentials in config, if using AWS_CONFIG_FILE, set AWS_SDK_LOAD_CONFIG=1
ОтветитьWhere to get Lambda function snippet used for key rotation?
ОтветитьDude the swallowing sounds 😬😬
ОтветитьCan we access secret manager across regions example I wana use keyparamer in one region to another
ОтветитьThis doesn't work unless you have a lot setup existing, you will run into may VPC issues...
ОтветитьBefore using "aws" in your command line you will have to install and configure it first. In Windows it requires installing Python so you can PIP the aws-sdk. Then adding an IAM role in AWS with permission SecretsManagerReadWrite. In your cmd use "aws configure" to set the following settings:
AWS Access Key ID: <IAM ACCESS KEY ID>
AWS Secret Access Key: <IAM SECRET (shown only once created>
Default region name: <REGION ie. us-west-2>
Default output format: json
Then cmd: "aws secretsmanager get-secret-value --secret-id <YOUR SECRET NAME>"
Well done, easy to understand and follow.
ОтветитьHi apurv
I tried to implemant your tutorial on how to access secrets across aws accounts by attaching resource based policy but could not able to use it. Let me know the steps of creating iam role with secret key policy for this.
Pretty good video with the practical examples and so on. I didn't understand when there is a rotation the previous secret remains still usable for a while or it is immediately removed. In the 2nd option what to happen to the application if it doesn't recover quickly the new secret, lost the database connection? Probably I'll find out in the documention
ОтветитьThis makes it so much easier for an attacker who hacked an application and was able to impersonate it to steal all the secrets conveniently through a standardized API rather than having to go looking for them in the environment/filesystem/code/memory...
ОтветитьGood one!
Ответить