-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFE: Make Aiven Operator more GitOps Friendly #472
Comments
Hey.
Thank you, that's very nice of you. Would this work for you? apiVersion: v1
kind: Secret
metadata:
name: mysecret
type: Opaque
data:
username: YWRtaW4=
password: bXktc2VjcmV0
---
apiVersion: aiven.io/v1alpha1
kind: MySQL
metadata:
name: mysql-sample
spec:
connInfoSecretTarget:
name: mysecret
Few cons:
|
Yes, this sounds perfectly reasonable
I think those cons are fine to live with. Documentation should make this clear though. Thanks! 🙌 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
The Aiven Operator is great and I can deploy a DB (sample using MYSQL) using it
However this stores the credentials in a secret. as specified under
spec.connInfoSecretTarget
Usually (and especially true when doing GitOps with Flux/Argo CD), the secret needs to be stored in Git. More specifically it's stored in Git via Vault, Sealed Secrets, and/or External Secret Operator.
I would like to be able to set up connection parameters beforehand (or as much as I can) and have the Aiven Operator "respect" these parameters (i.e. use the parameters to set up the DB).
The text was updated successfully, but these errors were encountered: