-
Notifications
You must be signed in to change notification settings - Fork 404
Chicken-egg loop issue with pods that depend on secrets created by kubernetes-external-secrets? #154
Comments
Any ideas, any feedback? |
Please please 😄 |
IMHO, I think this problem can’t solve with external secerts. Humm.. |
I have an idea about it that using Argocd But, We need a way to check two resources ( What do you think that? :-> |
(I have no experience with Argocd, so I cannot really comment on that, yet.) |
Damn, that was exactly was i plan to do too. Than i need a second livecycle to deploy the external secrets before i deploy the helm charts. |
Today, I was experimenting with
Above command will install the release and exists without errors.
The deployed Pods will be
If later, an expected
The problem with helm may occur if:
My helm is in version I hope it clarifies the issue. |
Closing this as I don't really see how we can improve / resolve this with KES. |
Hi!
Thanks for sharing kubernetes-external-secrets as software libre! 👍
We ran into a bit of a chicken-egg problem with kubernetes-external-secrets (version 1.2.0):
helm upgrade --install ...
so the the upgrade/installation fails.For a workaround, I break the loop by "downloading" secrets JSON off AWS secrets manager using AWS CLI, turning that JSON into a base64-encoded YAML secret resource for k8s and apply it using kubectl.
That same process is needed when adding new keys to the secret. Because helm install would fail and kubernetes-external-secrets will not copy the new keys because the external secret still lacks these keys. Ticket #94 to be related.
I wonder if I have to accept this problem as conceptual and permanent, because it's not very convenient.
Any ideas?
Thanks in advance!
The text was updated successfully, but these errors were encountered: