-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support kubernetes secret as secret manager in addition to raw and gcp #323
Comments
Thank you! Great idea! Let's continue discussion in your PR! |
Merged #330 |
Hi @ffais @nakamasato Looks like the support for k8s secret has been merged. I am trying to read the credential from secrets but its failing, i am using the example yaml you had mentioned. what is the new yaml format to use? Thanks! |
Hi @sprasad09, I decided to make no changes to the yaml schema, to avoid breaking the other secrets manager.
This is an example yaml of k8s usage:
|
Hi @ffais Thanks for your reply. I followed your instruction. I keep getting this error I have installed the mysql-operator as such output of the mysql-sample
|
Hi @sprasad09, add - --cloud-secret-manager=k8s to the args into the manager deployment. Should be something like this:
|
Hi @ffais I am getting the following error now. Wondering we have to specify the namespace where the secret is in somewhere?
|
Hi @sprasad09, This is an example from the helm chart:
|
Hi,
some operators for mysql write the root credentials in a secrets. Would it be possible to have these credentials read directly from secrets?
This could be an example:
The text was updated successfully, but these errors were encountered: