Locally, it works with start/dev scripts to pull and inject environment variables into local environments automatically and supports git-like pull/push commands to sync and share .env files manually via CLI if needed.
It also supports a range of other options for accessing secrets: SDKs, CLI, API.
Based on our record, Infisical should be more popular than Vault by HashiCorp. It has been mentiond 31 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
We use Infisical for both our dev and prod environments. If you're a YC company you can get your first year free. https://infisical.com. - Source: Hacker News / 8 months ago
You might want to take a look at Infisical (https://infisical.com). - Source: Hacker News / 8 months ago
Infisical is an open-source secret management platform designed to help teams centralize their secrets, such as API keys, database credentials, and configurations. - Source: dev.to / 9 months ago
Infisical is an open-source secret management platform to securely store and manage secrets for both users and applications. It integrates easily with many different application stacks and can replace environment variable-based secret workflows with simple API driven secret management. With advanced features like continuous monitoring and pre-commit checks, Infisical can help you prevent leaks and identify actions... - Source: dev.to / 10 months ago
Website: Infisical Documentation: Infisical Docs. - Source: dev.to / 12 months ago
Before you start, just a friendly reminder that HashiQube by default runs Nomad, Vault, and Consul on Docker. In addition, we’ll be deploying 21 job specs to Nomad. This means that we’ll need a decent amount of CPU and RAM, so Please make sure that you have enough resources allocated in your Docker desktop. For reference, I’m running an M1 Macbook Pro with 8 cores and 32 GB RAM. My Docker Desktop Resource... - Source: dev.to / over 2 years ago
When running cron jobs on Amazon EC2, you can, for example, use a secrets store like Vault. With Vault, your cron jobs can dynamically get the credentials they need. The secrets don’t get stored on the machine that’s running the cron jobs, and if you change a secret, the cron jobs will automatically receive that change. The downside of implementing a solution like Vault, however, is the overhead of managing the... - Source: dev.to / about 3 years ago
Vaultproject.io handles secrets management, so dynamic policies deal with database creds etc. "Manual" creds are stored in 1password or lastpass and added manually to Vault if it needs rebuilding. Source: over 3 years ago
It's all in the blog series, including sample configuration, but it's vaultproject.io and it allows you to do everything from managing simple secrets to auto-rotation of database credentials or even run your own KPI setup. Source: over 3 years ago
Our team is experimenting with Hashicorp Vault as our new credentials management solution. Thanks to the offical Vault Helm Chart, we are able to get an almost production-ready vault cluster running on our Kubernetes cluster with minimal effort. - Source: dev.to / almost 4 years ago
Doppler - Doppler is the multi-cloud SecretOps Platform developers and security teams trust to provide secrets management at enterprise scale.
EnvKey - Protect API keys and credentials. Keep configuration in sync everywhere.
KeePass - KeePass is an open source password manager. Passwords can be stored in highly-encrypted databases, which can be unlocked with one master password or key file.
Rot - Manage secrets safely with best encryption practices and seamless git integration for clarity.
VAULT - A password manager for freelancers, developers, agencies, IT departments and teams. VAULT safely stores account information and makes it easy to share between co-workers, other team members and clients.
Bitwarden Secrets Manager - A simpler, faster way to secure and manage secrets.