Replies: 2 comments 1 reply
-
|
I use the Docker Secrets implementation. Just add the This is what I do for all my containers that require a password/key/token. |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
Good solution for container that support the _FILE suffix... But not a global solution. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I recently migrated from Portainer to Arcane, and I have to say the tool is really great 👍
I’ve even connected agents on my other servers, which gives me a single, unified interface across all my infrastructure.
Now I’m starting to think about secrets management.
So far, I’m still using .env files, but that means secrets are stored in clear text, which is not ideal.
Before going further, I’d like to understand what the recommended best practices with Arcane are regarding secrets:
Is there a native way to manage secrets securely in Arcane?
Is it expected to rely on external tools (e.g. Docker secrets, SOPS, Vault, etc.)?
Are there any plans or guidelines documented somewhere for secret management?
In short: what is the “Arcane way” to avoid keeping secrets in plain text .env files?
Thanks in advance for your guidance, and congrats again on the project 🚀
Beta Was this translation helpful? Give feedback.
All reactions