mirror of
https://github.com/louislam/uptime-kuma.git
synced 2026-03-02 22:57:00 -05:00
Secrets management through vaults #2564
Labels
No labels
A:accessibility
A:api
A:cert-expiry
A:core
A:dashboard
A:deployment
A:documentation
A:domain expiry
A:incidents
A:maintenance
A:metrics
A:monitor
A:notifications
A:reports
A:settings
A:status-page
A:ui/ux
A:user-management
Stale
ai-slop
blocked
blocked-upstream
bug
cannot-reproduce
dependencies
discussion
duplicate
feature-request
feature-request
good first issue
hacktoberfest
help
help wanted
house keeping
invalid
invalid-format
invalid-format
question
releaseblocker 🚨
security
spam
type:enhance-existing
type:new
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/uptime-kuma#2564
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @vipasane on GitHub (Sep 7, 2023).
⚠️ Please verify that this feature request has NOT been suggested before.
🏷️ Feature Request Type
Other
🔖 Feature description
Transparent way to use (or synchronize) secrets such as usernames, passwords, connection strings, API keys and certificates between different vaults without the need to to have yet another copy of these values to be maintained manually locally. This store should be independent, agnostic on which node is used to run this probing task and therefore it should be rather tied to identity which is running that service(s)
Integrating services listed below would be great deal for attracting enterprise users:
Justification:
SREs rarely know or even should know production environment secrets, especially in they are automatically rotated.
Therefore there is a need to just pick up token string representing the secret from a list.
✔️ Solution
All the available secrets from single (or all available vault connections) is shown as list where user can select secret to be used. These secrets are refreshed from vaults periodically or even fetched when needed.
❓ Alternatives
Background service which will track changes in targeted (pre-configured) vaults and synchronizes changes in local encrypted cache.
📝 Additional Context
One practical example:
a .net way of tracking configuration changes https://learn.microsoft.com/en-us/azure/azure-app-configuration/reload-key-vault-secrets-dotnet