Skip to content

Commit

Permalink
176: Introducing VSecM Blog page (#231)
Browse files Browse the repository at this point in the history
Merging this to test in on the live site.

Signed-off-by: Abhishek Sharma <[email protected]>
  • Loading branch information
abhishek44sharma authored Aug 29, 2023
1 parent 7aa5944 commit 4493fbe
Show file tree
Hide file tree
Showing 7 changed files with 80 additions and 53 deletions.
8 changes: 4 additions & 4 deletions docs/_pages/0003-maintainers.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,9 +21,9 @@ next_url: /docs/security/
>edit this page on <strong>GitHub</strong> ✏️</a></p>
> **Hi 👋**
>
> **VMware Secrets Manager** *for Cloud-Native Apps* is maintained by
> a group of dedicated individuals [listed in the `CODEOWNERS` file][codeowners]
>
> **VMware Secrets Manager** *for Cloud-Native Apps* is maintained by
> a group of dedicated individuals [listed in the `CODEOWNERS` file][codeowners]
> on the **VMware Secrets Manager** GitHub repository.
{: .block-tip }

Expand All @@ -38,7 +38,7 @@ security, architecture decisions, and major feature developments.

**Ramiro Salas** [@RamXX](https://github.com/RamXX)

Ramiro is in charge of maintaining and enhancing the security aspects of the
Ramiro is in charge of maintaining and enhancing the security aspects of the
project.

## Core Contributors
Expand Down
2 changes: 1 addition & 1 deletion docs/_pages/0004-security.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ title: Security
layout: post
prev_url: /docs/maintainers/
permalink: /docs/security/
next_url: /docs/changelog/
next_url: /docs/blog/
---

<p class="github-button"
Expand Down
27 changes: 27 additions & 0 deletions docs/_pages/0005-blog.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
# /*
# | Protect your secrets, protect your sensitive data.
# : Explore VMware Secrets Manager docs at https://vsecm.com/
# </
# <>/ keep your secrets… secret
# >/
# <>/' Copyright 2023–present VMware, Inc.
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

title: VSecM Blog
layout: post
prev_url: /docs/security/
permalink: /docs/blog/
next_url: /docs/changelog/
---

<p class="github-button"
><a href="https://github.com/vmware-tanzu/secrets-manager/blob/main/docs/_pages/0003-blog.md"
>edit this page on <strong>GitHub</strong> ✏️</a></p>
## [Keep Your Secrets… Secret](/blog/keep-your-secrets/)[-@v0lkan](https://github.com/v0lkan)

In the ever-evolving landscape of cloud-native applications, secrets management
is critical to ensuring sensitive information’s security and integrity. While
several solutions are... [Read More](/blog/keep-your-secrets/)
Original file line number Diff line number Diff line change
Expand Up @@ -11,9 +11,9 @@

title: Changelog
layout: post
prev_url: /docs/security/
prev_url: /docs/blog/
permalink: /docs/changelog/
next_url: /docs/roadmap/
next_url: /docs/releases/
---

<p class="github-button"
Expand Down
File renamed without changes.
File renamed without changes.
92 changes: 46 additions & 46 deletions docs/blog/2023-08-15-keep-your-secrets.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,106 +15,106 @@ prev_url: /
permalink: /blog/keep-your-secrets/
---

by [Volkan Özçelik](https://github.com/v0lkan); last updated on August 15, 2023.
by [Volkan Özçelik](https://github.com/v0lkan); published on August 15, 2023.

## Introducing VMware Secrets Manager

![Welcome to the future of secrets management. (image generated by Midjourney)](/assets/VSecM-1.png)

In the ever-evolving landscape of cloud-native applications, secrets management
is critical to ensuring sensitive information’s security and integrity. While
several solutions are available, the recent shift in Hashicorp’s licensing towards
a Business Source License (*BSL*) has raised concerns and sparked discussions
In the ever-evolving landscape of cloud-native applications, secrets management
is critical to ensuring sensitive information’s security and integrity. While
several solutions are available, the recent shift in Hashicorp’s licensing towards
a Business Source License (*BSL*) has raised concerns and sparked discussions
within the community.

As the lead architect of [**VMware Secrets Manager** (**_VSecM_**)](https://vsecm.com/),
I’d like to take this opportunity to introduce our solution, which offers a robust,
As the lead architect of [**VMware Secrets Manager** (**_VSecM_**)](https://vsecm.com/),
I’d like to take this opportunity to introduce our solution, which offers a robust,
flexible, and **permissive** alternative to Hashicorp’s Vault.

> **⭐️ Star Us on GitHub ⭐️**
>
> If you find value in our approach and want to help others discover this outstanding
> technology, **[star our GitHub repository](https://github.com/vmware-tanzu/secrets-manager)**.
> Your support helps increase visibility and encourages more collaboration and
> If you find value in our approach and want to help others discover this outstanding
> technology, **[star our GitHub repository](https://github.com/vmware-tanzu/secrets-manager)**.
> Your support helps increase visibility and encourages more collaboration and
> innovation within the community.
{: .block-tip }

## A New Licensing Landscape

Hashicorp’s decision to adopt a Business Source License has been viewed by some
as a restrictive move. The BSL, unlike open-source licenses, imposes certain
limitations and conditions that may not align with the needs and values of all
Hashicorp’s decision to adopt a Business Source License has been viewed by some
as a restrictive move. The BSL, unlike open-source licenses, imposes certain
limitations and conditions that may not align with the needs and values of all
organizations and developers.

In contrast, VMware Secrets Manager is licensed under the BSD 2-Clause License,
a permissive open-source license that encourages collaboration, innovation,
In contrast, VMware Secrets Manager is licensed under the BSD 2-Clause License,
a permissive open-source license that encourages collaboration, innovation,
and freedom of use.

## VMware Secrets Manager: A Closer Look

**VSecM** is designed with modern developers and DevOps professionals in mind.
**VSecM** is designed with modern developers and DevOps professionals in mind.
Here’s why it stands out:

* **Ease of Use**: With a [**Quickstart Guide**](https://vsecm.com/docs/quickstart/),
intuitive [**CLI**](https://vsecm.com/docs/cli/?ref=zerotohero.dev), and
developer-friendly [**SDK**](https://vsecm.com/docs/sdk/), **VSecM**
* **Ease of Use**: With a [**Quickstart Guide**](https://vsecm.com/docs/quickstart/),
intuitive [**CLI**](https://vsecm.com/docs/cli/?ref=zerotohero.dev), and
developer-friendly [**SDK**](https://vsecm.com/docs/sdk/), **VSecM**
simplifies secrets management without compromising security.
* **Kubernetes Is a First-Class Citizen**: **VSecM** seamlessly integrates with
Kubernetes, leveraging [**SPIRE**](https://spiffe.io/docs/latest/spire-about/)
* **Kubernetes Is a First-Class Citizen**: **VSecM** seamlessly integrates with
Kubernetes, leveraging [**SPIRE**](https://spiffe.io/docs/latest/spire-about/)
for authentication and offering flexible secret storage and transformation options.
* **Community Engagement**: We believe in open collaboration and community-driven
development. Our [**Contributing Guide**](https://vsecm.com/docs/contributing/)
* **Community Engagement**: We believe in open collaboration and community-driven
development. Our [**Contributing Guide**](https://vsecm.com/docs/contributing/)
invites developers to get involved, ask questions, and contribute to the project.
* **Secure by Default**: **VSecM** offers advanced security features, including
encryption, manual master secret setting, and integration with various backing
* **Secure by Default**: **VSecM** offers advanced security features, including
encryption, manual master secret setting, and integration with various backing
stores.

## Join the Future of Secrets Management

**VMware Secrets Manager** is more than just a tool; it’s a community-driven project
that aims to redefine secrets management in a cloud-native world. We invite you to
explore **VSecM**, contribute to its growth, and join us in shaping the future of
**VMware Secrets Manager** is more than just a tool; it’s a community-driven project
that aims to redefine secrets management in a cloud-native world. We invite you to
explore **VSecM**, contribute to its growth, and join us in shaping the future of
secure and resilient applications.

Whether you’re a developer looking to contribute or an organization seeking a
flexible and secure solution for secrets management, **VSecM** offers a welcoming
Whether you’re a developer looking to contribute or an organization seeking a
flexible and secure solution for secrets management, **VSecM** offers a welcoming
and innovative platform.

### This is Just the Beginning: A Vision for the Future

At **VMware Secrets Manager**, we believe in continuous innovation and growth.
Our [**roadmap**](https://vsecm.com/docs/roadmap) is a testament to our commitment
to delivering cutting-edge solutions that meet the evolving needs of the cloud-native
At **VMware Secrets Manager**, we believe in continuous innovation and growth.
Our [**roadmap**](https://vsecm.com/docs/roadmap) is a testament to our commitment
to delivering cutting-edge solutions that meet the evolving needs of the cloud-native
community.

Here's a glimpse of what's on the horizon:

* **Stability and Usability Enhancements**: Upcoming releases focus on improving
* **Stability and Usability Enhancements**: Upcoming releases focus on improving
stability, documentation, build automation, and overall user experience.
* **Innovative Features**: From Secretless VSecM to machine-readable logs,
performance improvements, and large-scale secret ingestion, we're pushing the
* **Innovative Features**: From Secretless VSecM to machine-readable logs,
performance improvements, and large-scale secret ingestion, we're pushing the
boundaries of what's possible in secrets management.
* **Integration and Compatibility**: Future iterations include integration with
AWS KMS, Azure Key Vault, Google Cloud KMS, and even HashiCorp Vault, expanding
* **Integration and Compatibility**: Future iterations include integration with
AWS KMS, Azure Key Vault, Google Cloud KMS, and even HashiCorp Vault, expanding
the reach and compatibility of VSecM.
* **Community Development and Collaboration**: We're investing in community
development efforts, multi-cluster secret federation, and creating abstractions
* **Community Development and Collaboration**: We're investing in community
development efforts, multi-cluster secret federation, and creating abstractions
to make cloud integrations easier.

Our roadmap is not just a plan; it’s a promise to our users and contributors that
we have a lot planned for the future of **VMware Secrets Manager**.
Our roadmap is not just a plan; it’s a promise to our users and contributors that
we have a lot planned for the future of **VMware Secrets Manager**.

We’re excited about the journey ahead and invite you to be a part of it.

> **⭐️ Star Us on GitHub ⭐️**
>
> If you find value in our approach and want to help others discover this
> outstanding technology, **[star our GitHub repository](https://github.com/vmware-tanzu/secrets-manager)**.
> Your support helps increase visibility and encourages more collaboration and
> If you find value in our approach and want to help others discover this
> outstanding technology, **[star our GitHub repository](https://github.com/vmware-tanzu/secrets-manager)**.
> Your support helps increase visibility and encourages more collaboration and
> innovation within the community.
{: .block-tip }

### Help Us Shape the Future

[**Start your journey with VMware Secrets Manager today**](https://vsecm.com/)
[**Start your journey with VMware Secrets Manager today**](https://vsecm.com/)
and unlock the potential of cloud-native secrets management.

0 comments on commit 4493fbe

Please sign in to comment.