TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: Open-source alternative to HashiCorp/IBM Vault

123 pointsby vmatsiiakoabout 1 year ago

9 comments

INTPenisabout 1 year ago
Slightly on topic but we&#x27;ve been talking about vaults and keys for years now and I work in CI&#x2F;CD but I still am no wiser to how I&#x27;m supposed to practically use this in my pipelines.<p>Can someone link something that explains it like I have 20 years in IT but I&#x27;m clueless.<p>I can&#x27;t get past the fact that a key has to exist somewhere, a key that will give you some sort of access to a secret. So how is it any better if the key already exists in the CI&#x2F;CD pipeline variables?<p>Another thing I&#x27;m curious about is rotation, which on paper is amazing but in practice would require your vault to have sysadmin access to all your systems, in order to do rotation. It just seems like a tall order to integrate.
评论 #40156076 未加载
评论 #40155672 未加载
评论 #40155338 未加载
评论 #40177723 未加载
评论 #40161927 未加载
评论 #40155083 未加载
评论 #40155339 未加载
评论 #40161607 未加载
评论 #40156438 未加载
martialblogabout 1 year ago
There is also a Vault Fork called OpenBao <a href="https:&#x2F;&#x2F;github.com&#x2F;openbao&#x2F;openbao">https:&#x2F;&#x2F;github.com&#x2F;openbao&#x2F;openbao</a>
评论 #40154068 未加载
评论 #40155730 未加载
评论 #40154509 未加载
minebreakerabout 1 year ago
I&#x27;m always looking for the secret management solution for my self hosted apps. This looks very cool, but still unable to solve my biggest problem - how should I manage secrets to access the secret manager?<p>In my day job, we use AWS SSM. It works great. For my home network, I just put secrets on my docker-compose.yaml. Obviously I shouldn&#x27;t but I can&#x27;t find a better solution.
评论 #40155114 未加载
评论 #40158551 未加载
评论 #40154718 未加载
评论 #40160063 未加载
评论 #40156421 未加载
评论 #40154437 未加载
akshayKMRabout 1 year ago
Has anyone built or know of a convenient secrets management&#x2F;workflow for services deployed by systemd?<p>My wants:<p>- Secrets not visible by inspecting process env vars (&#x2F;proc&#x2F;PID&#x2F;environ).<p>- No secrets on disk (encrypted is fine).
评论 #40155165 未加载
asteriskeabout 1 year ago
Is there an open source alternative to Hashicorp Nomad? It&#x27;s such a nice alternative to k8s&#x2F;k3s.
评论 #40190715 未加载
评论 #40161678 未加载
Fabulous3447about 1 year ago
Bitwarden Secrets Manager might fit your needs as an open source alternative to HashiCorp Vault fyi. I am biased (I work at Bitwarden) but still a great option for those looking to switch from HashiCorp! <a href="https:&#x2F;&#x2F;bitwarden.com&#x2F;products&#x2F;secrets-manager&#x2F;" rel="nofollow">https:&#x2F;&#x2F;bitwarden.com&#x2F;products&#x2F;secrets-manager&#x2F;</a>
评论 #40168673 未加载
thayneabout 1 year ago
It isn&#x27;t clear how to build this without the enterprise proprietary components, except maybe to fork it and tear out all the code for the ee folders and everything that references it.
thunderbongabout 1 year ago
Does Infisical have SSH management like Vault? I recently set this up in Vault and it worked very well
thyrsusabout 1 year ago
I looked at vault, but I opted for a simpler, less flexible solution: rrsync (restricted rsync) to a tree available only to an account with its .ssh&#x2F;authorized_keys populated with the host public keys with forced rrsync commands restricted to that host&#x27;s secrets. Root is the only account that can read a host&#x27;s corresponding private key, so that means an attacker must crack root to get this extra access - but why bother when the secret (e.g. private certificate) is already on the host for root to read? Code to translate the known_hosts into the .ssh&#x2F;authorized_keys file is a dozen lines more than a perl one-liner only because of triple checking to prevent damage to the result, e.g., in file system full circumstances. Chicken&#x2F;egg: other means must manage host private keys and ssh_known_hosts. But you had to do that anyways.