Home / Companies / Octopus Deploy / Blog / Post Details
Content Deep Dive

Using AWS Secrets Manager with Octopus

Blog post from Octopus Deploy

Post Details
Company
Date Published
Author
Mark Harrison
Word Count
1,218
Language
English
Hacker News Points
-
Summary

Mark Harrison's blog post, published on November 22, 2021, provides a comprehensive guide to using the AWS Secrets Manager - Retrieve Secrets step template within Octopus Deploy. The post details how to retrieve secrets stored in AWS Secrets Manager using AWS Command Line Interface (CLI) and outlines the necessary steps for authentication with AWS, emphasizing the importance of appropriate IAM permissions. The guide explains how to extract key/value pairs from secrets, create sensitive output variables for them, and manage versioned secrets with staging labels. It also highlights the flexibility of the step template, which supports retrieving multiple secrets simultaneously, and shows how to configure parameters such as AWS account, region, and secret names. The step template is compatible with both Windows and Linux systems and can be integrated into deployment and runbook processes, allowing for seamless use of AWS-stored secrets in Octopus deployments.