AWS Glue with SecretManager for database credentials












0















I am having a AWS Glue Python script which I am using for connecting to an Aurora Mysql database. For this, I tried to use AWS SecretManager so that I do not have to hardcode the database credentials in the script.



While I am able to successfully use secretmanager and use it in my AWS Glue script to connect to RDS, I see that the credentials are not secret, and if I print the contents of a variable holding the database credentials, I am able to see the passwords, username, etc. in the cloudwatch logs.



Please find herewith the code snippet:



# Getting DB credentials from Secrets Manager
client = boto3.client("secretsmanager", region_name="us-west-2")

get_secret_value_response = client.get_secret_value(
SecretId="RDS_Dev_Cluster"
)

secret = get_secret_value_response['SecretString']
secret = json.loads(secret)

db_username = secret.get('username')
db_password = secret.get('password')
db_url = secret.get('host')

print db_username
print db_password
print db_url


Is there any way we can encrypt the username/password credentials. Can we use AWS KMS? I haven't tried KMS in this, but would like to get suggestions before using another AWS service. If not, how can we mask the database credentials besides secretmanager.



Thanks










share|improve this question



























    0















    I am having a AWS Glue Python script which I am using for connecting to an Aurora Mysql database. For this, I tried to use AWS SecretManager so that I do not have to hardcode the database credentials in the script.



    While I am able to successfully use secretmanager and use it in my AWS Glue script to connect to RDS, I see that the credentials are not secret, and if I print the contents of a variable holding the database credentials, I am able to see the passwords, username, etc. in the cloudwatch logs.



    Please find herewith the code snippet:



    # Getting DB credentials from Secrets Manager
    client = boto3.client("secretsmanager", region_name="us-west-2")

    get_secret_value_response = client.get_secret_value(
    SecretId="RDS_Dev_Cluster"
    )

    secret = get_secret_value_response['SecretString']
    secret = json.loads(secret)

    db_username = secret.get('username')
    db_password = secret.get('password')
    db_url = secret.get('host')

    print db_username
    print db_password
    print db_url


    Is there any way we can encrypt the username/password credentials. Can we use AWS KMS? I haven't tried KMS in this, but would like to get suggestions before using another AWS service. If not, how can we mask the database credentials besides secretmanager.



    Thanks










    share|improve this question

























      0












      0








      0








      I am having a AWS Glue Python script which I am using for connecting to an Aurora Mysql database. For this, I tried to use AWS SecretManager so that I do not have to hardcode the database credentials in the script.



      While I am able to successfully use secretmanager and use it in my AWS Glue script to connect to RDS, I see that the credentials are not secret, and if I print the contents of a variable holding the database credentials, I am able to see the passwords, username, etc. in the cloudwatch logs.



      Please find herewith the code snippet:



      # Getting DB credentials from Secrets Manager
      client = boto3.client("secretsmanager", region_name="us-west-2")

      get_secret_value_response = client.get_secret_value(
      SecretId="RDS_Dev_Cluster"
      )

      secret = get_secret_value_response['SecretString']
      secret = json.loads(secret)

      db_username = secret.get('username')
      db_password = secret.get('password')
      db_url = secret.get('host')

      print db_username
      print db_password
      print db_url


      Is there any way we can encrypt the username/password credentials. Can we use AWS KMS? I haven't tried KMS in this, but would like to get suggestions before using another AWS service. If not, how can we mask the database credentials besides secretmanager.



      Thanks










      share|improve this question














      I am having a AWS Glue Python script which I am using for connecting to an Aurora Mysql database. For this, I tried to use AWS SecretManager so that I do not have to hardcode the database credentials in the script.



      While I am able to successfully use secretmanager and use it in my AWS Glue script to connect to RDS, I see that the credentials are not secret, and if I print the contents of a variable holding the database credentials, I am able to see the passwords, username, etc. in the cloudwatch logs.



      Please find herewith the code snippet:



      # Getting DB credentials from Secrets Manager
      client = boto3.client("secretsmanager", region_name="us-west-2")

      get_secret_value_response = client.get_secret_value(
      SecretId="RDS_Dev_Cluster"
      )

      secret = get_secret_value_response['SecretString']
      secret = json.loads(secret)

      db_username = secret.get('username')
      db_password = secret.get('password')
      db_url = secret.get('host')

      print db_username
      print db_password
      print db_url


      Is there any way we can encrypt the username/password credentials. Can we use AWS KMS? I haven't tried KMS in this, but would like to get suggestions before using another AWS service. If not, how can we mask the database credentials besides secretmanager.



      Thanks







      python amazon-web-services aws-glue secret-manager






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Nov 14 '18 at 13:08









      YuvaYuva

      408417




      408417
























          0






          active

          oldest

          votes











          Your Answer






          StackExchange.ifUsing("editor", function () {
          StackExchange.using("externalEditor", function () {
          StackExchange.using("snippets", function () {
          StackExchange.snippets.init();
          });
          });
          }, "code-snippets");

          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "1"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });














          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53300978%2faws-glue-with-secretmanager-for-database-credentials%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown

























          0






          active

          oldest

          votes








          0






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes
















          draft saved

          draft discarded




















































          Thanks for contributing an answer to Stack Overflow!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53300978%2faws-glue-with-secretmanager-for-database-credentials%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          這個網誌中的熱門文章

          Xamarin.form Move up view when keyboard appear

          Post-Redirect-Get with Spring WebFlux and Thymeleaf

          Anylogic : not able to use stopDelay()