You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Using crossplane, we need to generate on demand some random_password (using hashicorp/random) and save them to the Vault, which will be used later by the kubernetes created at the same time (eg. by a CSI Driver).
We tried to build a "crossplane-provider-random" using provider-jet-template, but for some reason it didn't work as aspected, so we turned to provider-terraform which works fine for the generation part but for now we don't have the option to enable the external secret store
How could Crossplane help solve your problem?
We need to modified a bit the code by enabling the flag --enable-external-secret-stores and the logic behind, a storeconfig type and its crd, the modfied version is now used in our project and works pretty well.
The text was updated successfully, but these errors were encountered:
What problem are you facing?
Using crossplane, we need to generate on demand some random_password (using hashicorp/random) and save them to the Vault, which will be used later by the kubernetes created at the same time (eg. by a CSI Driver).
We tried to build a "crossplane-provider-random" using provider-jet-template, but for some reason it didn't work as aspected, so we turned to provider-terraform which works fine for the generation part but for now we don't have the option to enable the external secret store
How could Crossplane help solve your problem?
We need to modified a bit the code by enabling the flag --enable-external-secret-stores and the logic behind, a storeconfig type and its crd, the modfied version is now used in our project and works pretty well.
The text was updated successfully, but these errors were encountered: