Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Using existingSecret for Mongo and Mariadb causes failure #1

Open
wazoo opened this issue Nov 18, 2022 · 1 comment
Open

Using existingSecret for Mongo and Mariadb causes failure #1

wazoo opened this issue Nov 18, 2022 · 1 comment

Comments

@wazoo
Copy link

wazoo commented Nov 18, 2022

When specifying a custom secret name using existingSecret in the Bitnami chart with the required values then causes several containers to fail to deploy as these are using a generated secret name even when the secret name is provided. I see in the sample values that this isn't supported but it really should be as this is the modern way to manage secrets in kubernetes.

This is an example of a place that this needs to be updated: web-service-backend.yaml

This is another spot that breaks when using an existing secret: grpc.yaml

@pogossian
Copy link
Member

It's not supported because we still have microservices that read database credentials from the config file (not ENV).
For example, here you can see we're generating configmap based on values, then that configmap will be mounted as a configuration file for grpc microservice.
As soon as all microservices support databases access credentials via ENV, the helm chart will be updated, and using existingSecret will become possible

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants