There is a better way.
There is a better way.
There is a better way.
Eliminate misconfigurations.
Eliminate misconfigurations.
Eliminate misconfigurations.
The 7-Factor Config principles describe a new way of managing secrets, parameters, and templates, enabling teams to deploy reliably, scale quickly, and reduce unplanned downtime and security incidents.
The 7-Factor Config principles describe a new way of managing secrets, parameters, and templates, enabling teams to deploy reliably, scale quickly, and reduce unplanned downtime and security incidents.
The 7-Factor Config principles describe a new way of managing secrets, parameters, and templates, enabling teams to deploy reliably, scale quickly, and reduce unplanned downtime and security incidents.
DRY don't repeat yourself
DRY don't repeat yourself
DRY don't repeat yourself
Declare config variable names once to easily inject flexible variable values across build, deploy, and run-time phases.
DECOUPLED
DECOUPLED
DECOUPLED
Configuration is externalized from source code. Code changes are separate from config changes.
Configuration is externalized from source code. Code changes are separate from config changes.
Configuration is externalized from source code. Code changes are separate from config changes.
ABSTRACTED
ABSTRACTED
ABSTRACTED
Separate how code and configuration interact. Distinguish between values (i.e. "log level") and the interface (how the "log level" value is fetched.)
Separate how code and configuration interact. Distinguish between values (i.e. "log level") and the interface (how the "log level" value is fetched.)
CENTRALIZED
CENTRALIZED
CENTRALIZED
Consolidate configuration complexity into a single location because it's easier to manage complexity within one system versus in multiple locations.
Consolidate configuration complexity into a single location because it's easier to manage complexity within one system versus in multiple locations.
OBVIOUS
OBVIOUS
OBVIOUS
Organize configuration to make it easier to understand for people and systems. Troubleshooting and onboarding new people all benefit from obvious config.
Organize configuration to make it easier to understand for people and systems. Troubleshooting and onboarding new people all benefit from obvious config.
Organize configuration to make it easier to understand for people and systems. Troubleshooting and onboarding new people all benefit from obvious config.
SECURE
SECURE
SECURE
Secrets are config, and configuration needs to be securely managed with role-based access controls and an independent tamper-proof audit trail.
Secrets are config, and configuration needs to be securely managed with role-based access controls and an independent tamper-proof audit trail.
Secrets are config, and configuration needs to be securely managed with role-based access controls and an independent tamper-proof audit trail.
VERSIONED
VERSIONED
VERSIONED