2023-10-11 14:44:12 -07:00

47 lines
2.4 KiB
Markdown
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
title: "Pulumi ESC: Environments, Secrets, and Configuration"
layout: esc
meta_title: "Pulumi ESC: Environments, Secrets, and Configuration"
meta_desc: Centralized environments, secrets, and configuration management for cloud applications and infrastructure
meta_image: "/images/product/esc-how-it-works-diagram.png"
aliases:
- /esc
benefits:
title: Benefits of Pulumi ESC
items:
- icon: lock
icon_color: purple
title: Frictionless Security
description: Easy-to-use single source of truth for all configuration and secrets with guardrails. Seamlessly adopt short-lived dynamic secrets.
- icon: lightning
icon_color: yellow
title: Improve Developer Efficiency
description: Never have downtime over changed configuration. Change once and have it updated everywhere. 
- icon: gavel
icon_color: salmon
title: Control Access and Compliance
description: Enforce least-privileged access through role-based access controls. All changes are fully logged for auditing.
diagram:
items:
- number: 1
description: Pulumi ESC enables you to define environments, which contain collections of secrets and configuration. Each environment can be composed from multiple environments.
- number: 2
description: Pulumi ESC supports a variety of configuration and secrets sources, and it has an extensible plugin model that allows third-party sources.
- number: 3
description: Pulumi ESC has a rich API that allows for easy integration. Every value in an environment can be accessed from any execution environment.
- number: 4
description: Every environment can be locked down with RBAC, versioned, and audited.
screenshot:
items:
- title: Composable
description: Environments contain collections of secrets and configuration. Compose environments together from multiple other environments to allow easy inheritance of shared configuration, eliminating “copy and paste errors”.
- title: Traceable
description: Never lose track of where configurations are being used and where. Trace the downstream impact of any configuration to see if the impact matches your expectations. 
- title: Versionable
description: Create different versions of environments, so you can gracefully migrate between breaking configuration changes.
---