Skip to main content

Tired of managing hundreds or thousands of configurations as your microservice footprint scales? Tired of config files, environment variables, poorly managed secrets, and constantly crashing containers due to configuration mismanagement? There’s a better way. Figgy!

Project description

Figgy

Cultivate configuration clarity with Figgy. Open-source, cloud-native, configuration & secret management in AWS.

Learn everything you need to know about Figgy by checking out the website:

https://www.figgy.dev

Join our Slack community:

https://slack.figgy.dev

Figgy 1.0 is out!

Figgy is a free and opensource serverless application config framework designed to bring simplicity, security, and resilience to application config management. Figgy is built on top of AWS ParameterStore and leverages native AWS constructs such as AWS IAM, KMS, among other services to ensure a simple and elegant integration with your AWS environment.

Never roll another application to production having forgotten to set that last pesky config in production.

Figgy makes it possible to bind your code directly to configurations. Easily break builds if configs are missing and application deployments are destined to fail.

Control user access like a champ

Figgy makes it easy to set up and control access to across all of your AWS environments and configuration namespaces. Consider your role types and use cases, map them up in a simple config file, and let Figgy do the rest. Audit all user activity and changes over time, and roll back any config or group of configurations to any point-in-time -- to the second!

Integrate with your SSO provider, abandon long-lived AWS Keys for good

Figgy supports SAML based SSO integrations with multi-factor authentication. Simplify AWS access control with Figgy!

Feature rich CLI to speed-up your development workflow.


Figgy will help you:

  • Establish secure best practices from the start
  • Prevent failed deployments and application downtime due to configuration mismanagement
  • Save you time by automating simple configuration management tasks
  • Give you peace of mind through high availability and resiliency, versioned configurations, audit logs, and easy rollbacks or restores.
  • Keep secrets with their owners by cutting out the middle-man and establishing a strong framework of least-privilege.
  • Avoid 3rd party lock-in or external dependencies -- Figgy deploys serverlessly into your AWS environments
  • Keep your configuration store tidy. No more unused or stray configurations causing ongoing confusion.

Why Figgy?

Simple & secure config and secret management

As your cloud footprint grows, so do the configurations you need to manage your applications. Figgy is a framework for simple, secure, and resilient config management in AWS. The best part? No new servers to deploy, upgrade, and patch. No complex software to learn. Follow Figgy’s laid-out path for config management. It’s AWS native, compatible with all AWS services, and follows AWS best practices. Let Figgy help you get it right from the start.


Prevent downtime due to config mismanagement

Figgy provides a suite of utilities that link your code to your configs. Detect and remedy misconfigurations before deployment rather than scrambling after the alarm bells are going off.


Let the secret owners own the secrets

Figgy establishes a framework for teams of secret owners to securely track, manage, and rotate their secrets in their team’s secure space. From that space they can share secrets directly with the applications that need them -- without going through a middle-man. No more LastPass, one-time urls, secrets sent over Slack, email, encrypted files, or any of those annoying secret management hoops. In a few weeks, when your coworker "Bill" finds new employment, don’t ask yourself, "What secrets passed through Bill that we need to rotate now?"


Easily manage and maintain least privilege

Figgy makes it easy to give both users and applications the exact amount of access they need and nothing more, and provides a framework for scalably maintaining and enforcing least privilege. By following Figgy best practices you can easily maintain appropriate access for users and services while keeping your IAM policies short and sweet.


Maximum visibility & resiliency

Figgy maintains a history of every event that has ever occurred in your configuration store since the day you installed Figgy. Know what happened, where, when, and by who. Then, roll back any configuration, or hierarchy of configurations, to any point-in-time in the past, to the second.

Want to dip your toes in and test out the waters? Try out our free Sandbox

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

figgy-cli-1.2.10.tar.gz (158.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

figgy_cli-1.2.10-py3-none-any.whl (231.4 kB view details)

Uploaded Python 3

File details

Details for the file figgy-cli-1.2.10.tar.gz.

File metadata

  • Download URL: figgy-cli-1.2.10.tar.gz
  • Upload date:
  • Size: 158.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.9.16

File hashes

Hashes for figgy-cli-1.2.10.tar.gz
Algorithm Hash digest
SHA256 545838b6fb5640432993bddc9c4d397bf46116ed858d0bb6c9b9d68cb50b54a2
MD5 8891225a863a0fb280cafc30992c8353
BLAKE2b-256 e73ffa6ae1f5e9ccbae081b1b622c34212eb8e2a1410f40b062eb6fe1e6c97d9

See more details on using hashes here.

File details

Details for the file figgy_cli-1.2.10-py3-none-any.whl.

File metadata

  • Download URL: figgy_cli-1.2.10-py3-none-any.whl
  • Upload date:
  • Size: 231.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.9.16

File hashes

Hashes for figgy_cli-1.2.10-py3-none-any.whl
Algorithm Hash digest
SHA256 39e1af4448e454c6f420308c14578da0a60c0c715ba3a2ec9916670dedc69bde
MD5 21ce69063292fd5a6ef397a2fce85c3b
BLAKE2b-256 313ab1721171b1de64b6462a3eebf8fdbcdf9954bbf47ce2e2aea47724c9aecb

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page