-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for AWS Secrets Manager as an external key value store #6563
Comments
I started looking into implementing this myself and found I can inject individual secrets as environment variables named The |
Hi @jonathanfoster, Thanks for raising this ticket. We are reviewing the enhancements we made to KV storage earlier this year and looking towards the future possibilities (which include improving support for other storage options). In terms of the documentation, it's a tricky subject to cover concisely at the moment, due to some details of the implementation, but we have tried to be as clear as possible what notation is supported in different scenarios. Thanks for your support. |
Is your feature request related to a problem? Please describe.
I'm an enterprise Tyk Cloud customer and I have a ton of APIs that require auth tokens for upstream API authorization. I use AWS Secrets Manager for external secrets, but this isn't natively supported by Tyk. Instead I have to run External Secrets Operator to inject secrets as environment variables, which requires me to store all secret key-value pairs in one external secret (e.g.,
TYK_GW_SECRETS=key:value,key2:value2
). There's no way for me to allow individual API owners to manage their own secrets.Describe the solution you'd like
A solution would be to natively support AWS Secrets Manager as an external key-value store.
Describe alternatives you've considered
The current workaround is to use External Secrets Operator to map secrets from AWS to environment variables in Tyk. This has the limitation of only supporting one secret with all key-value pairs.
Another option I've consider is installing Vault and have it integrate with AWS. This would require an enterprise license for Vault though.
The text was updated successfully, but these errors were encountered: