Aegis is a Kubernetes-native, lightweight secrets management solution that keeps your secrets secret. With Aegis, you can rest assured that your sensitive data is always secure and protected. Check out Aegis on GitHub for details.
Although the recommended approach to using Aegis is through Aegis SDK or Aegis Sidecar, that can require you to change the applications’ source code; however, you might not have control over their source code. So that might not always be possible.
The video tutorial at the end of this article covers the use case of interpolating Aegis-managed secrets into Kubernetes Secrets using Go Template transformation. The approach outlined in the video enables you to integrate Aegis to your system with minimal code change in your applications.
Here’s a sequence diagram of how Aegis interpolated the secrets that it manages onto Kubernetes
Secrets (tap the image to enlarge):
And here’s a demo video that outlines how this can be achieved:
Make sure to visit Aegis on GitHub, for the most up-to-date code and information about it.
Enjoy, and may the source be with you 🦄.
\ \\, \\\,^,.,,. “Zero to Hero” ,;7~((\))`;;,, <zerotohero.dev> ,(@') ;)`))\;;', stay up to date, be curious: learn ) . ),(( ))\;, /;`,,/7),)) )) )\,, (& )` (,((,((;( ))\,