Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
Automation is the core of RightScale, freeing you to run efficient, scalable, and highly-available applications. Our multi-cloud integration enables you to choose your own clouds, providing freedom to work with any vendor in a rapidly changing market. And rest assured knowing that you have visibility and control over all of your resources in one place. To take advantage of best practices, we encourage you to tap into cloud expertise provided by our service, support, and partner networks when building and managing your infrastructure. | Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log. |
Supports: Amazon Web Services (AWS), Datapipe, Google Cloud Platform, HP Cloud, IDCF — Yahoo! Japan, Rackspace, SoftLayer, Windows Azure, CloudStack, OpenStack;Access, manage, and configure all of your resources — compute, networking, and storage — across all of your clouds.;See and manipulate all of your cloud servers in one place.;Configure your networking resources such as IP addresses, content delivery networks, firewalls, and virtual private networks. Manage block storage volumes and object stores to enable web serving, content delivery, persistent data storage, and backups.;Persistence in a non-persistent cloud;Tag and SSH into servers;Logically group servers together;Easily view complex environments;Cloud resources: Provision, configure, edit, and decommission.;Monitoring: Track and graph custom metrics in the dashboard or export to your own systems.;Auditing: Track and export audit logs.;Provisioning: Manage accounts, users, and permissions.;Build upon MultiCloud Images;Configure dynamically;Tune with input variables;Inherit preferences or set at launch;Store in your configuration library;Track and control versions;Find differences between configurations;Integrate with revision control systems;RightScale MultiCloud Marketplace offers pre-built cloud ServerTemplates, scripts, and architectures published by RightScale, our partners, and our users.;Keep tabs on your environment’s health with more than 80 built-in server, volume, database, and application monitors.;Create custom views on the Dashboard with QuickMonitoring and Widgets.;Manage an entire operations team with user authentication and permission controls. Assign roles by user and account to control administrative, billing, monitoring, publishing, and operational tasks. | Secure Secret Storage: Arbitrary key/value secrets can be stored in Vault. Vault encrypts these secrets prior to writing them to persistent storage, so gaining access to the raw storage isn't enough to access your secrets. Vault can write to disk, Consul, and more.;Dynamic Secrets: Vault can generate secrets on-demand for some systems, such as AWS or SQL databases. For example, when an application needs to access an S3 bucket, it asks Vault for credentials, and Vault will generate an AWS keypair with valid permissions on demand. After creating these dynamic secrets, Vault will also automatically revoke them after the lease is up.;Data Encryption: Vault can encrypt and decrypt data without storing it. This allows security teams to define encryption parameters and developers to store encrypted data in a location such as SQL without having to design their own encryption methods.;Leasing and Renewal: All secrets in Vault have a lease associated with it. At the end of the lease, Vault will automatically revoke that secret. Clients are able to renew leases via built-in renew APIs.;Revocation: Vault has built-in support for secret revocation. Vault can revoke not only single secrets, but a tree of secrets, for example all secrets read by a specific user, or all secrets of a particular type. Revocation assists in key rolling as well as locking down systems in the case of an intrusion. |
Statistics | |
GitHub Stars - | GitHub Stars 33.4K |
GitHub Forks - | GitHub Forks 4.5K |
Stacks 19 | Stacks 816 |
Followers 27 | Followers 802 |
Votes 0 | Votes 71 |
Pros & Cons | |
No community feedback yet | Pros
|
Integrations | |
| No integrations available | |

Scalr is a remote state & operations backend for Terraform with access controls, policy as code, and many quality of life features.

Morpheus is a cloud application management and orchestration platform that works on any cloud or infrastructure, from AWS to bare metal. Enjoy complete cloud freedom with Morpheus.

Doppler’s developer-first security platform empowers teams to seamlessly manage, orchestrate, and govern secrets at scale.
It centralizes, simplifies and automates the encryption key management process to help minimize risk and reduce operational costs of encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for IBM and non-IBM storage solutions using the OASIS Key Management Interoperability Protocol (KMIP).

A container native solution that strengthens the Trusted Delivery component of container security by integrating secret distribution directly into the container platform.

AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.

Securely store config and manage access in an end-to-end encrypted, auto-syncing desktop app. Connect your apps in minutes in any language with an environment variable and a line or two of code.

Knox is a SaaS (Secrets as a Service) that helps you manage your keys, secrets, and configurations. Start in minutes and close the widest security breach. You cannot keep storing secrets in your git repo or sharing them by email or slack me

Keywhiz is a secret management and distribution service that is now available for everyone. Keywhiz helps us with infrastructure secrets, including TLS certificates and keys, GPG keyrings, symmetric keys, database credentials, API tokens, and SSH keys for external services — and even some non-secrets like TLS trust stores. Automation with Keywhiz allows us to seamlessly distribute and generate the necessary secrets for our services, which provides a consistent and secure environment, and ultimately helps us ship faster.

Continuous visibility and cloud monitoring for all your servers – hosted or private, Linux or Windows. Works great with Amazon EC2, Rackspace, or any public or private cloud.