This message was deleted.
s
This message was deleted.
c
you can create a AWS secrets manager resource and then reference the arn of that resource in your fargate task definition
Copy code
"secrets": [
        {
          "name": "DATABASE_PASSWORD",
          "valueFrom": "arn:aws:secretsmanager:us-east-1:awsExampleAccountID:parameter/awsExampleParameter"
        }
      ]
n
Cheers Mike. Thatโ€™s helpful ๐Ÿ™‚
๐Ÿ‘ 1
l
FYI Pulumi secrets are only secret between where they're persisted, and your code. Once your code puts them somewhere, they're unencrypted. Generally solutions like Mike's are the way to go: the secret is secret in AWS's storage and used by AWS services.
n
That makes sense and was my understanding (thank you for clarifying though ๐Ÿ™‚ )
and it turned out to be dead easy to set it as ssm parameter, so now I know how to solve it seems obvious
๐Ÿ‘ 1