Skip to main content

General

Armory Support Information (Hours of Operation/SLAs/Procedures)

Armory offers a variety of support options depending on your needs. With the resources below, customers should be able to find answers to any questions regarding their support contract and what kind of service-level agreements to be expected as a customer of Armory. There are many ways to contact support, but our first suggestion is always to check our documentation at docs.armory.io or our kb.armory.io as we constantly seek to improve our customers’ self-service experience.

Storing application secrets in vault for use in Spinnaker pipeline.

Application secrets should not be passed through Spinnaker or any other deployment tool as this is not safe from a security standpoint. If the tool is breached you now have all applications secrets that were passed through the pipeline exposed. The only things that should ever be passed through a deployment tool are location and/or references to the secret.The best practice for application secrets is for the application to fetch the secret itself during application startup. For VMs this is during the VM bootstrap or application startup process. For Kubernetes you would usually use do this using an init-container, sidecar, or both.For Vault here are some resources on how to get this working for Kubernetes//www.hashicorp.com/blog/injecting-vault-secrets-into-kubernetes-pods-via-a-sidecar/https//itnext.io/dynamic-vault-secrets-agent-sidecar-on-kubernetes-cc0ce3e54a94For AWS Secrets Manager and Vault see the following//www.godaddy.com/engineering/2019/04/16/kubernetes-external-secrets/https://github.com/godaddy/kubernetes-external-secrets