Skip to main content

Sensitive Data in Azure Pipelines - Azure Variable Groups (Benefits and Real-World Examples)

 



Secret variables are variables that are encrypted and can be used in pipelines without having their value revealed. You can use secret variables to store confidential information like passwords, identification numbers, and other identifying information that you wouldn't want to be exposed in a pipeline. Secret variables are accessible to tasks and scripts on the agent and are encrypted at rest with a 2048-bit RSA key.

Secret variables specified in a pipeline's pipeline settings UI are only applicable to that pipeline. To share confidential variables between pipelines, utilize variable groups.


What are Azure Variable Groups? Key-value pairs, or variables, can be used in many pipelines and stages of an Azure DevOps project and are managed centrally by Azure Variable Groups. These variables can be used to store configuration values that may change depending on the environment (such as development, staging, or production), as well as private data like connection strings or API keys. Through the deployment pipeline, Variable Groups make it easier to manage these variables consistently.

How to Create a Variable Group?




How to add a variable with encrypted value to a Variable Group?



How to link a variable from a Variable Group to a pipeline and define its scope?


 

Managing Secrets in Azure Variable Groups:



Benefits of Azure Variable Groups:

1. Reusability: Variable Groups let you declare variables once and use them again across several pipelines, encouraging uniformity and lowering the possibility of human entry errors.

2. Centralised Management: By managing variables in a single area with Variable Groups, you may update values and transmit changes more quickly throughout your pipelines.

3. Security: To protect sensitive data, Azure Variable Groups support secret variables, which are encrypted and can only be viewed during pipeline execution.

4. Versioning is supported through variable groups, enabling you to follow changes over time. When debugging or auditing deployments, this functionality is helpful.

5. Integration with CI/CD PipelinesAzure Variable Groups and other CI/CD technologies are smoothly integrated with Azure Pipelines. It is simple to retrieve and use variables during the build and release processes since they are simply referred to within pipeline specifications.


Real-World Examples:

1.      API Keys and Secrets: It's typical to have API keys or secrets for each environment when working with third-party APIs. You can construct variables like "API_KEY_DEV," "API_KEY_STAGING," and "API_KEY_PROD" and safely store the appropriate keys or secrets using Azure Variable Groups. This makes it possible for you to migrate between environments without having to manually change your pipelines or reveal sensitive data.

2.      Database Connection Strings: Assume that one of your applications connects to a database and that the connection string differs depending on the environment. You can construct environment-specific variables like "DB_CONNECTION_STRING_DEV," "DB_CONNECTION_STRING_STAGING," and "DB_CONNECTION_STRING_PROD" by building a Variable Group for connection strings. Your deployment pipeline can then make use of these variables to make sure the appropriate connection string is utilized based on the destination environment.

3.      Feature flags and configuration settings: Environments frequently have different feature flags and configuration settings. By using Variable Groups, you can quickly manage the behavior and settings of your application during deployment by defining environment-specific variables like "FEATURE_FLAG_DEV" or "CONFIG_SETTING_STAGING".

 

Summary:

Azure Variable Groups offer centralized configuration management, reuse, improved security, versioning, and connection with CI/CD pipelines. By utilizing these advantages, you may increase consistency, accelerate the deployment of your applications, and manage variables and configurations in Azure DevOps more easily.

Comments

Popular posts from this blog

How to Unzip files in Selenium (Java)?

1) Using Java (Lengthy way) : Create a utility and use it:>> import java.io.BufferedOutputStream; import org.openqa.selenium.io.Zip; import java.io.File; import java.io.FileInputStream; import java.io.FileOutputStream; import java.io.IOException; import java.util.zip.ZipEntry; import java.util.zip.ZipInputStream;   public class UnzipUtil {     private static final int BUFFER_SIZE = 4096;     public void unzip (String zipFilePath, String destDirectory) throws IOException {         File destDir = new File(destDirectory);         if (!destDir.exists()) {             destDir.mkdir();         }         ZipInputStream zipIn = new ZipInputStream(new FileInputStream(zipFilePath));         ZipEntry entry = zipIn.getNextEntry();         // to iterates over entries in the zip folder         while (entry != null) {             String filePath = destDirectory + File.separator + entry.getName();             if (!entry.isDirectory()) {                 extractFile (zipIn, filePath);            

Encode/Decode the variable/response using Postman itself

We get a lot of use cases where we may have to implement Base64 encoding and/or decoding while building our APIs. And, if you are wondering if it is possible to encode/decode the variable/response using Postman itself or how to encode/decode the token or password in postman and save it in a variable? To Base64 encode/decode, the quickest way is to use JavaScript methods btoa, atob: atob - It turns base64-encoded ASCII data back to binary. btoa - It turns binary data to base64-encoded ASCII. Sample code : var responseBody = pm.response.json(); var parsedPwd = JSON.parse(atob(responseBody.password)); // presuming password is in the payload pm.collectionVariables.set("password", parsedPwd);

The use of Verbose attribute in testNG or POM.xml (maven-surefire-plugin)

At times, we see some weird behavior in your testNG execution and feel that the information displayed is insufficient and would like to see more details. At other times, the output on the console is too verbose and we may want to only see the errors. This is where a verbose attribute can help you- it is used to define the amount of logging to be performed on the console. The verbosity level is 0 to 10, where 10 is most detailed. Once you set it to 10, you'll see that console output will contain information regarding the tests, methods, and listeners, etc. <suite name="Suite" thread-count="5" verbose="10"> Note* You can specify -1 and this will put TestNG in debug mode. The default level is 0. Alternatively, you can set the verbose level through attribute in "maven-surefire-plugin" in pom.xml, as shown in the image. #testNG #automationTesting #verbose # #testAutomation