No Vault by HashiCorp videos yet. You could help us improve this page by suggesting one.
Based on our record, Vault by HashiCorp should be more popular than Rot. It has been mentiond 5 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
I built Rot to solve this. It creates a git diff-able list of keyrings and secrets that you can inject via environment variables to sub commands, like `rot run mykeyring terraform apply`. You can use Shamir Secret Sharing to create "disaster recovery" access into the keyrings too. https://rotx.dev. - Source: Hacker News / 8 months ago
Https://rotx.dev can also be used for a local password safe, and it supports environment variables injection into various scripts or workflows. (author of rot). - Source: Hacker News / 10 months ago
Before you start, just a friendly reminder that HashiQube by default runs Nomad, Vault, and Consul on Docker. In addition, we’ll be deploying 21 job specs to Nomad. This means that we’ll need a decent amount of CPU and RAM, so Please make sure that you have enough resources allocated in your Docker desktop. For reference, I’m running an M1 Macbook Pro with 8 cores and 32 GB RAM. My Docker Desktop Resource... - Source: dev.to / over 2 years ago
When running cron jobs on Amazon EC2, you can, for example, use a secrets store like Vault. With Vault, your cron jobs can dynamically get the credentials they need. The secrets don’t get stored on the machine that’s running the cron jobs, and if you change a secret, the cron jobs will automatically receive that change. The downside of implementing a solution like Vault, however, is the overhead of managing the... - Source: dev.to / about 3 years ago
Vaultproject.io handles secrets management, so dynamic policies deal with database creds etc. "Manual" creds are stored in 1password or lastpass and added manually to Vault if it needs rebuilding. Source: over 3 years ago
It's all in the blog series, including sample configuration, but it's vaultproject.io and it allows you to do everything from managing simple secrets to auto-rotation of database credentials or even run your own KPI setup. Source: over 3 years ago
Our team is experimenting with Hashicorp Vault as our new credentials management solution. Thanks to the offical Vault Helm Chart, we are able to get an almost production-ready vault cluster running on our Kubernetes cluster with minimal effort. - Source: dev.to / almost 4 years ago
Bitwarden Secrets Manager - A simpler, faster way to secure and manage secrets.
Doppler - Doppler is the multi-cloud SecretOps Platform developers and security teams trust to provide secrets management at enterprise scale.
Infisical - Infisical is an open source, end-to-end encrypted platform that lets you securely sync secrets and configs across your engineering team and infrastructure
KeePass - KeePass is an open source password manager. Passwords can be stored in highly-encrypted databases, which can be unlocked with one master password or key file.
VAULT - A password manager for freelancers, developers, agencies, IT departments and teams. VAULT safely stores account information and makes it easy to share between co-workers, other team members and clients.
AWS Secrets Manager - AWS Secrets Manager to Rotate, Manage, Retrieve Secrets