Skip to content

Commit 778b011

Browse files
Rahul-4480vjdhama
authored andcommitted
fix: markdown linting issue's
1 parent 27688a4 commit 778b011

File tree

1 file changed

+8
-10
lines changed

1 file changed

+8
-10
lines changed

content/blog/terraform_secrets_management_guide.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,6 @@ In this blog, we'll explore several methods for managing secrets and credentials
1717

1818
Using environment variables to manage secrets in Terraform is straightforward and commonly used. This approach keeps sensitive data like usernames and passwords out of your codebase and allows for easy integration with your CI/CD pipelines.
1919

20-
#### Step-by-Step Guide
21-
2220
Imagine you need to create an AWS RDS instance, and you want to keep the database username and password secure.
2321

2422
**1. Define Sensitive Variables in Terraform:**
@@ -77,11 +75,11 @@ terraform apply
7775

7876
Using encrypted files to manage secrets in Terraform is a robust approach that enhances security by leveraging AWS Key Management Service (KMS). This method ensures that sensitive information is stored in an encrypted format and decrypted only when needed by Terraform.
7977

78+
<!-- markdownlint-disable MD033 -->
8079
<p align="center">
8180
<img src="/images/blog/terraform-secrets-management/encrypted-files-kms.webp" alt="Encrypted Files (KMS)" style="border-radius: 10px; width: 300; height: 500;">
8281
</p>
83-
84-
#### Step-by-Step Guide
82+
<!-- markdownlint-enable MD033 -->
8583

8684
Imagine you need to create an AWS RDS instance, and you want to keep the database username and password secure by storing them in an encrypted file.
8785

@@ -96,7 +94,7 @@ db_password: my_db_password
9694
9795
**2. Encrypt the YAML File Using AWS KMS:**
9896
99-
*Alternative 1: Using AWS CLI*
97+
***Alternative 1: Using AWS CLI***
10098
10199
You can use the AWS CLI to manually encrypt your YAML file:
102100
@@ -106,7 +104,7 @@ aws kms encrypt --key-id <your-kms-key-id> --region <your-region> --plaintext fi
106104

107105
Replace `<your-kms-key-id>` and `<your-region>` with your KMS key ID and AWS region, respectively.
108106

109-
*Alternative 2: Using Terraform*
107+
***Alternative 2: Using Terraform***
110108

111109
You can also handle encryption through Terraform:
112110

@@ -210,11 +208,11 @@ terraform apply
210208

211209
AWS Secrets Manager provides a secure way to store and manage sensitive information such as database credentials, API keys, and other secrets. This method allows you to retrieve secrets dynamically within your Terraform configuration, ensuring that sensitive data is never hard-coded in your Terraform files.
212210

211+
<!-- markdownlint-disable MD033 -->
213212
<p align="center">
214213
<img src="/images/blog/terraform-secrets-management/secrets-manager.webp" alt="AWS Secrets Manager" style="border-radius: 10px; width: 300; height: 500;">
215214
</p>
216-
217-
#### Step-by-Step Guide
215+
<!-- markdownlint-enable MD033 -->
218216

219217
Here’s how you can manage your database credentials using AWS Secrets Manager:
220218

@@ -317,11 +315,11 @@ For projects managed with GitHub, using GitHub Secrets is a convenient way to st
317315

318316
and manage secrets securely within GitHub Actions workflows. This method is particularly useful for CI/CD pipelines where you need to keep sensitive data safe while automating deployments.
319317

318+
<!-- markdownlint-disable MD033 -->
320319
<p align="center">
321320
<img src="/images/blog/terraform-secrets-management/github-actions-workflow.png" alt="GitHub Secrets" height="300" width="500" style="border-radius: 10px;">
322321
</p>
323-
324-
#### Step-by-Step Guide
322+
<!-- markdownlint-enable MD033 -->
325323

326324
Here’s how you can manage your database credentials using GitHub Secrets:
327325

0 commit comments

Comments
 (0)