Difference between revisions of "How can I pass secrets or sensitive information securely to containers in an Amazon ECS task?"

From wikieduonline
Jump to navigation Jump to search
 
(22 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 +
*  https://aws.amazon.com/premiumsupport/knowledge-center/ecs-data-security-container-task/
 +
* <code>[[aws ssm put-parameter --type SecureString]]</code>
 +
* <code>[[aws secretsmanager create-secret]]</code>
  
  
  
* https://aws.amazon.com/premiumsupport/knowledge-center/ecs-data-security-container-task/
+
  {{ecs-tasks.amazonaws.com}}
 +
 
 +
 
 +
 
 +
{{secrets valueFrom}}
 +
 
 +
 
 +
* <code>[[secrets =]]</code>
 +
* [[Terraform resource: aws_ssm_parameter]]
 +
 
 +
== Related ==
 +
* [[Terraform Secrets Manager]]: <code>[[aws_secretsmanager_secret]]</code>
 +
* [[AWS Secrets Manager]]
 +
* [[AWS Systems Manager Parameter Store]]
 +
* <code>[[valueFrom]]</code>
  
  
 +
<code><nowiki>
 +
    secrets = [
 +
      {
 +
        name      = "YOUR_NAME"
 +
        valueFrom = "${var.yourvar}" == "" ? "arn:aws:ssm:${var.aws_region}:${data.aws_caller_identity.current.account_id}:parameter/YOUR_PARAMETER${upper(var.env)}_YOUR_PASSWORD" : "arn:aws:ssm:${var.aws_region}:${data.aws_caller_identity.current.account_id}:parameter/YOUR_SECOND_PASSWORD"
 +
      }
 +
    ],
 +
</nowiki></code>
  
 +
== See also ==
 +
* {{aws_caller_identity}}
 
* {{container_definitions}}
 
* {{container_definitions}}
 
* {{secrets}}
 
* {{secrets}}
* {{AWS ECS}}
+
 
 +
[[Category:AWS]]

Latest revision as of 11:09, 18 May 2023


 {
 "Version": "2012-10-17",
 "Statement": [
   {
     "Sid": "",
     "Effect": "Allow",
     "Principal": {
       "Service": "ecs-tasks.amazonaws.com"
     },
     "Action": "sts:AssumeRole"
   }
 ]
}


    secrets = [
     {
       name      = "YOUR_SECRET"
       valueFrom = "arn:aws:ssm:${var.aws_region}:${data.aws_caller_identity.current.account_id}:parameter/YOUR_PARAMETER"
     }
   ],


Related[edit]


secrets = [ { name = "YOUR_NAME" valueFrom = "${var.yourvar}" == "" ? "arn:aws:ssm:${var.aws_region}:${data.aws_caller_identity.current.account_id}:parameter/YOUR_PARAMETER${upper(var.env)}_YOUR_PASSWORD" : "arn:aws:ssm:${var.aws_region}:${data.aws_caller_identity.current.account_id}:parameter/YOUR_SECOND_PASSWORD" } ],

See also[edit]

Advertising: