-
Notifications
You must be signed in to change notification settings - Fork 271
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[k8s operator] Allow every field from Credentials to be configured from a secret #2051
Comments
Hi @eshepelyuk, thanks for your request, and it seems reasonable to pick the username and host from the secret. You will have it in the next release. |
Thanks for quick feedback, |
Hi @eshepelyuk, We will consider adding |
https://discord.com/channels/930720389120794674/1147429172076097647 |
Hi @eshepelyuk, we have released Operator v0.3.3 🎉 with more flexibility when configuring credentials #90. According to this update, we have also added a new flag
Thanks for your contribution ❤️ . I will mark the issue as resolved. Feel free to create new issues if you have any ideas for improvements. |
Thanks will give it a try hopefully this week. |
Hi all
It would be useful to to extend
credentials
field to allow at least host and user to be picked up from a secret. Ideally every field could be picked up from the secret.https://atlasgo.io/integrations/kubernetes/operator#credentials-object
The motivation is that we're using 3rd party software (Crossplane) to create DB and role for a microservices. As a result the k8s secret is generated with username, db host, port and password. Unfortunately Crossplane 's secret structure is static. Also the db host / username can vary depending on Crossplane CRD config, so they can't be hardcoded in advance in Atlas CRD.
Currently as a workaround I have to generate another Atlas specific secret that contains URL from the secret created by Crossplane .
For the same purpose I also would like to have a new field of the same
credentials
type to be introduced for using it as a devDB credentials.Crossplane secret for pgsql contains
username
password
endpoint
(aka host)port
The text was updated successfully, but these errors were encountered: