-
Notifications
You must be signed in to change notification settings - Fork 540
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Alternative to Secrets Manager for Signature #291
Comments
Specifically we're thinking about two options:
Ideally these changes would be opt-in when a secret is chosen by the user so the considerations of changing the secret are known to the end user. Let me know if either of these changes would be palatable for the team and we can look into them further. |
@dashford thanks for your feedback. We'll put this one into our backlog. |
Hi @beomseoklee, thanks for responding. We're in the middle of moving over traffic to the image handler so approximately only 30% of image requests are going to the handler, the rest is still going to our previous solution. Looking back over the last 30 days Cloudwatch is telling us we've made 54,031,008 requests to Secrets Manager. |
Hi @beomseoklee, do you have an update on this issue or its progress in your backlog? We should be able to provide a PR if that would speed up the fix? |
What is your question?
After deploying the image handler into one of our production environments we've noticed a large increase in Secrets Manager costs. We're wondering whether it's feasible to have an alternative where the signature is retrieved from the lambda's environment rather than from secrets manager directly as this would eliminate that cost increase.
I'd be happy to put a PR in place for that, I'm asking here just to check if that would be an acceptable submission?
The text was updated successfully, but these errors were encountered: