There are many ways to use ‘secrets’ in ECS and ECS Fargate. Most of the time they are exposed using Environment variables, because a few years ago this was the only easy option. Today we have two improved options. You could add a tool to your docker container which retrieves and decrypts your secrets before parsing them to the application. The other one is to embed the retrieval and decryption in the application. Both approaches are covered in this blog post.

I published this blog post when I was part of Binx.io:

Read the full blog post on binx.io

Photo by Patrick Fore on Unsplash

Author
Martijn van Dongen
Cloud Evangelist / MCE
Martijn works at Schuberg Philis as Cloud Evangelist and Mission Critical Engineer (MCE). Martijn is an active AWS developer, architect, consultant, and trainer. He is chair of AWSug.nl and recognized as an AWS Community Hero.
View more
Next Blog
blog
AWS CLI aliases: shorten your most used commands
June 30, 2019 | Est. read time: 1 minute
One of the best kept secrets of the AWS CLI should be the ‘alias’ feature. It’s a native feature of AWS. In this blog post I’ll describe how to get started and show you a couple of my most used aliases so far.
Read
Tags
aws cli