-
Notifications
You must be signed in to change notification settings - Fork 323
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ECS Secrets Management #8
Comments
Will this only be AWS Secrets Manager and not AWS Systems Manager Parameter Store? |
@whithajess ECS supports AWS Systems Manager Parameter Store as of 11/15/18: https://aws.amazon.com/about-aws/whats-new/2018/11/aws-launches-secrets-support-for-amazon-elastic-container-servic/ |
@Bensign Thanks for the info I guess I missed that - Unfortunately still lacking support for |
@whithajess We are actively working on Fargate support for both options: AWS Systems Manager Parameter Store & AWS Secrets Manager. I'll update back here on this thread as things go live. |
@Bensign Awesome - Thanks I really like this new public roadmap and hope it continues, has already given me a lot of useful info. I follow a RSS feed of whats new in AWS but its pretty easy to miss relevant stuff given the amount of new things daily. |
First of all. It's great this roadmap is shared, kudos for that! The new Task definition parameter Next to that SSM has been problematic when it comes to API limits. It would help if AWS would come clear regarding the API limits so that it's possible to use SSM more extensively without the risk of hitting API limits. |
@maartenvanderhoef This is such a great idea...I would request for Secrets and Fargate too. We've also been hit by SSM API throttling (via Lambda) :( |
What about being able to mount secret into the container as the file, as Kubernetes does? |
You can also check out https://aws.amazon.com/containers/new – we keep this regularly updated with the latest containers related release postings and blog links. |
Hi all, A few updates here:
Volume mounts for secrets rather than environment variables has been something we've discussed in the past. Thanks for opening the issue on that. I think I'll also separately create an issue for vending an entire path as that has popped up a few times as well. Thanks everyone for the continued feedback on this! |
Yes please! This would be very useful for mounting in config files for community built images of non-cloud-native software without having to re-bake images or juggle sidecar containers. |
Would this potentially change the # of api calls that are made to the SSM service at container start? Currently, if you have a custom startup script to get N number of secrets from SSM? We've found it fairly cost prohibitive if you start/stop containers very frequently and have 10+ secrets that get fetched/decrypted at container start time in terms of the SSM costs. |
Will this also contain using the |
Just want to second this. You (Amazon) would know better than us, but I think many of your customers manage their TaskDefinitions in CFN. Also, looks like it is a separate issue to track this #97 . |
Is it me, or does https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ecs-taskdefinition-containerdefinitions.html not yet reflect the new |
What about similar support in EKS? We have run into it here: kubernetes-sigs/aws-load-balancer-controller#754 (comment) |
Hi, Is there an ETA for
Has been in Coming Soon for quite a while now :) |
If anyone missed it: |
But this still is not supported in cloudformation
…On Thu, Apr 4, 2019, 13:39 Max Scholz ***@***.***> wrote:
If anyone missed it:
Beginning on April 2, 2019, any new Fargate task launched supports
injecting sensitive data into your containers by storing your sensitive
data in either AWS Secrets Manager secrets or AWS Systems Manager Parameter
Store.
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#8 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/Ab5nJA7NHJMdgASdbKnnuoH404n9iaXxks5vdeSFgaJpZM4Y4Ej4>
.
|
@sarojgharat We have started doing a workaround creating the container_definitions outside of CFN and then letting CFN referencing it when creating the task. Which works just fine for our needs.. |
Thanks. Can you give me some hints on how to achieve this ?
…On Thu, Apr 4, 2019, 13:43 Max Scholz ***@***.***> wrote:
@sarojgharat <https://github.com/sarojgharat> We have started doing a
workaround creating the container_definitions outside of CFN and then
letting CFN referencing it when creating the task.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#8 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/Ab5nJDPW_NTkx_rrrfDZVa2biX85CcA6ks5vdeVRgaJpZM4Y4Ej4>
.
|
Well
Then we have a script that checks for changes on this file and pushes it. We then change the Revision number we want to deploy by hand actually (organizational process) but you could for example let your CFN always run the latest (by not specifying a number) but then I think CFN has problems finishing the creation of the stack... |
Is it somehow possible to specify the I tried parameter
|
Hello I believe I might have an issues with this integration? I check if I was able to get the value of the secret using the aws CLI, and yes, doe it brings more than just the value of the secret. I'm wondering if maybe there might be and issue with this when using the secret on ECS? |
@kiros-sc can you send your task definition (the one that failed) to ecs-agent-external AT amazon.com so we can take a look? thanks. |
Ok, mail sent with the TaskDef on it. |
I hope this doesn't bother anyone but I found the solution to my issue. It was more related to how I was creating the "secret" in the secret manager. This morning I used another secret which was created the same way, using "plain text" ()not the key/value, but as "secret Name" it was used the word "datadog", updated my task configuration with the new ARN and carefull here, setting the "name" in the "secretOptions" to "ApiKey" (just in case try different way to set that up >> apikey, Apikey, apiKey and ApiKey) and the issue was gone aswell. So resuming all of this... I believe my issue was resolved when creating the secre using the "plaintext" setting. |
Enable customers to vend sensitive information from AWS Systems Manager Parameter Store and AWS Secrets Manager in the form of environment variables when a service on ECS or Fargate is started. The various components of this issue are:
The text was updated successfully, but these errors were encountered: