adrienkohlbecker / ejson-kmsLinks
ejson-kms is a utility for managing a collection of secrets in source control using AWS KMS.
☆22Updated last year
Alternatives and similar repositories for ejson-kms
Users that are interested in ejson-kms are comparing it to the libraries listed below
Sorting:
- okta-aws, but go☆32Updated 4 years ago
- Toolkit to help understand what's going on with your RDS parameter groups☆27Updated 7 years ago
- Roll all instances within a kubernetes cluster, using a zero-downtime strategy.☆51Updated 3 years ago
- Terraform provider for Buildkite (work in progress)☆36Updated 3 years ago
- Garbage collector for Amazon ECR docker registry☆49Updated 4 years ago
- A daemon for responding to AWS AutoScaling Lifecycle Hooks☆147Updated last week
- Terraform provider for checking out git repositories and making changes☆40Updated 6 years ago
- A tool for populating templates with environment variables and Vault values☆83Updated 5 years ago
- Use GitHub teams to manage system user accounts and authorized_keys☆148Updated 3 months ago
- ☆54Updated last month
- Terraform State of Awareness Dashboard☆35Updated 3 years ago
- Helper scripts for working with temporary and MFA credentials from the AWS STS service☆19Updated 9 years ago
- Terraform Slack Provider☆69Updated 4 years ago
- Automatic Alpine Linux Package (apk) Repository Generation using AWS Lambda, S3 & SSM Parameter Store☆45Updated 4 years ago
- Terraform / infrastructure-as-code coverage badges - how much of your AWS infrastructure is managed by Terraform?☆67Updated 5 years ago
- Terraform provider for secrets stored with credstash☆68Updated 4 years ago
- No longer maintained: Terraform provider to manage pingdom resources☆120Updated 2 years ago
- Ephemeral Kubernetes clusters☆69Updated 2 years ago
- Terraform setup to deploy an ECS based concourse-ci setup.☆28Updated 3 years ago
- CLI for AssumeRole is a tool for running programs with temporary credentials from AWS's AssumeRole API.☆49Updated 2 years ago
- Buildkite pipeline planner☆44Updated 2 years ago
- Handle secrets in Docker using AWS KMS, SSM parameter store, Secrets Manager, or Azure Key Vault☆54Updated 2 years ago
- Punch holes in your AWS security groups.☆70Updated 3 years ago
- Vault Unseal automation☆131Updated 6 years ago
- Sidecar container for requesting dynamic Vault database secrets☆84Updated last week
- cron job runner; statsd metrics with optional DogStatsd event emissions☆56Updated 4 years ago
- A @HashiCorp Terraform provider for interacting with the filesystem☆62Updated 8 months ago
- A @HashiCorp Vault plugin for authenticating and receiving policies via Slack.☆50Updated 5 years ago
- ☆29Updated 5 years ago
- Multi Account Command☆20Updated 5 years ago