By centrally managing confidential information in the local environment with 1Password, you can prevent the risk of disclosing API Keys, etc. to github.
Read More →
How to use AWS Secrets Manager for storing confidential information such as API Keys.
Read More →
Read More →
Introduction Mail received at SES, It will automatically save to S3 Bucket. SES can start up Lambda at the timing it received and store it directly in DynamoDB or RDS. However, in order to prevent DynamoDB capacity limitation and mail failure due to failure, I decided to save it to S3 for the moment. Then, if you start Lambda with the save to S3 as a trigger, it will become
Read More →
In AWS (ECS / EC 2), when using database password or RSA secret key, It is good to obtain from AWS Secrets Manager Terraform settings AWS Secrets Manager Create AWS Secrets Manager with terraform resource "aws_secretsmanager_secret" "something" { name = "${var.app_name}/${terraform.workspace}/something" kms_key_id = "${aws_kms_key.main.key_id}" } resource "aws_secretsmanager_secret_version" "something" { secret_id = "${aws_secretsmanager_secret.something.id}" secret_string = "{}" lifecycle { ignore_changes = ["secret_string"] } } IAM Role Add permissions to read/write values to
Read More →