Skip to content

Secure Handling of Superset Credentials in UMT’s EKS Deployment #37

@paulpascal

Description

@paulpascal

Description

We are currently developing a new feature in the User Management Tool (UMT) that integrates with Superset (Issue #191). The integration involves enabling the Superset REST API and authenticating using an admin account to obtain tokens for creating users, roles, filters, etc. A draft pull request is available for review: PR #245.

Challenge

We need a secure and scalable method to manage Superset credentials in our EKS-based deployment. Specifically, we aim to avoid exposing these credentials in:

  • Source code
  • values.yaml files in Helm
  • Any version-controlled repository files

Current Approaches Considered

  1. Environment Variables (values.yaml)
  2. Kubernetes Secrets
  3. AWS Secrets Manager

Desired Solution Criteria

  • Retrieve credentials from a secure storage service.
  • Simplify the process of updating secrets without modifying Helm charts, possibly through kubectl or other means.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions