Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Airbyte should support external secret stores #837

Closed
2 of 3 tasks
michel-tricot opened this issue Nov 6, 2020 · 16 comments
Closed
2 of 3 tasks

Airbyte should support external secret stores #837

michel-tricot opened this issue Nov 6, 2020 · 16 comments
Labels
area/platform issues related to the platform team/platform-move type/enhancement New feature or request

Comments

@michel-tricot
Copy link
Contributor

michel-tricot commented Nov 6, 2020

Tell us about the problem you're trying to solve

I would like Airbyte to store connector secrets in external secret stores (HashiCorp Vault, AWS Secrets Manager, GCS Secrets Manager...)

Target Secret Stores

@michel-tricot michel-tricot added the type/enhancement New feature or request label Nov 6, 2020
@ChristopheDuong
Copy link
Contributor

FYI this is handled in Airflow and i guess commonly used so if we switch/integrate somehow, this could benefit from it too:
https://airflow.apache.org/docs/1.10.10/howto/use-alternative-secrets-backend.html

@chethanuk
Copy link

+1 Nice to have an alternative secrets backend, even just the Hashicorp vault will be better.
Mainly it solves:

  • Central secrets managements
  • Reduce manual rotation of secrets in all the systems.

Helps in Automating secrets management end to end.

@tovbinm
Copy link

tovbinm commented Aug 23, 2021

+1 plugable secret store

@prasrvenkat
Copy link
Contributor

Not sure if it's under consideration, but, If possible, reading from existing stores would be huge benefit. In our case we have a different flow keeping our tokens up-to-date elsewhere since we use them as well for different use cases in our product so simply mentioning a way to read from existing external stores would be nice. Happy to work with Airbyte on any/all part of it.

@airbyte-jenny airbyte-jenny mentioned this issue Sep 8, 2021
14 tasks
@iamzjk
Copy link
Contributor

iamzjk commented Oct 15, 2021

Would be great if it can read from env variables too.

@vbhamidipati
Copy link

+1 - this is an important security capability

@raphaelauv
Copy link

raphaelauv commented Jan 12, 2022

look like you can use the GCP secret manager to store the secret with the setting -> SECRET_PERSISTENCE_TYPE

@novotl
Copy link
Contributor

novotl commented Jan 19, 2022

Hi, any updates / estimates on this?

We would like to run Airbyte OSS on Kubernetes, but unencrypted secrets is a big security hazard for us. Environment variables or HashiCorp Vault would suit us the best.

@anand-srinivaas
Copy link

+1 this would be really helpful !

@cavanaug
Copy link

cavanaug commented Jun 16, 2022

FWIW. This is an interesting project as well for folks wanting to expose secrets in K8s. It sort of provides the abstraction layer, so you dont necessarily write code for each vaulting system. It is something we are looking to utilize internally in our own k8s infrastructure.

https://github.com/kubernetes-sigs/secrets-store-csi-driver

davydov-d added a commit that referenced this issue Oct 28, 2022
davydov-d added a commit that referenced this issue Oct 28, 2022
…ception' of github.com:airbytehq/airbyte into ddavydov/#750-#837-#904-source-s3-raise-AirbyteTracedException
@cgardens
Copy link
Contributor

We support GCP secrets store and AWS secrets manager. It is possible to add other external secrets stores.

@Sayon0
Copy link

Sayon0 commented Jul 15, 2023

Hey it looks like you guys support writing to a secrets store for any secrets, however, how do I set airbyte to read a secret from an existing secret store.

More specifically, I'm setting up a source that requires and API key, and I don't want to have my team type that API key in, I would like for them to just state the name of the secret in the secret store

@pgrant87
Copy link

We've had a request to add CyberArk secret support from a customer in a support case, Feature request for this at: #32981

@ecofer-zip
Copy link

Has anyone integrated Airbyte with Azure KeyVault for storing key/pwd/uid info securely? This could be a blocker for us to use Airbyte.

@VeeraswamyGatta
Copy link

Hi Team,

To follow up on previous question on Key Vault , does any one integrated Key Vault? if yes any reference link.

@tovbinm
Copy link

tovbinm commented Jun 18, 2024

Using AWS Systems Manager with encrypted params is also way cheaper than AWS Secrets Manager

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/platform issues related to the platform team/platform-move type/enhancement New feature or request
Projects
None yet
Development

No branches or pull requests