-
Notifications
You must be signed in to change notification settings - Fork 161
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PostgreSQL and Redis existingSecret
not respected on ArgoCD sync
#450
Comments
Thanks for filing this issue, @salcinad Did you manage to get one deployment working? If not, I'd advocate to uninstall completely the chart and try again in a proper deployment.
That is very surprising, as password management is handled by the chart itself and should keep any previously defined/generated value.
Can you share the secrets as defined in your Kubernetes cluster, before and after an upgrade or a sync? You can, of course, change the actual values before posting in here, but please keep a way to see if the values are the same or different between versions of the secrets. |
Indeed, as that Issue is closed, I did not realize that, sorry for bumping closed issue.
First deployment is always Ok. But any other update, it would like to sync netbox-postgres and netbox-redis secrets, other two secrets (netbox-config, netbox-superuser) are fine. And when testing I am aways deleting Application and the namespace on k8s cluster so everything is clear.
This can ofcourse be an ArgoCD issue on our side, but we also have same bitnami chart for standalone postgres and not having this issue, or for example Harbor is also using redis as sub chart (same bitnami chart) and no issue there. We are still looking, but noting obivisly is popuig up.
Sure, will test tomorrow in different cluster and let provided the info here. Edit # 1
|
existingSecret
not respected on ArgoCD sync
Thanks for your input.
|
This is how we did Initial setup, we let chart deploy without setting existingSecret or setting passwords manually. then exported these secrets to yaml, deleted unneeded data from yaml (see below), deleted application, deleted namespace where it was installed, used then existingSecret to reference to these secrets exported yaml, and added them to values.yaml under
In my comment above the application deployed successfully, the ArgoCD deployed sealed-secrets which are applied to correct namespace in correct k8s cluster and NetBox is available over Ingress and login (superuser - which is also existing secret) its working just fine, all pods up (see below), as well as LDAPs.
But now ArgoCD is showing that this Application is |
Thanks for the details.
If this still does not work, can you confirm the secrets values do not get base64 encoded twice? |
The Helm chart version
5.0.0-beta.167
Environment Versions
Custom chart values
Current Behavior & Steps to Reproduce
Tested with different option in valuey.yaml for existing secrets but did it just do not work. Once the secret is overwritten, the worker complains that password is incorrect, and the whole netbox pod does not start.
django.db.utils.OperationalError: connection failed: connection to server at "10.95.18.196", port 5432 failed: FATAL: password authentication failed for user "netbox"
Even if we do not use existingSecrets and let ArgoCD create secrets, they are getting regenerated over every ArgoCD sync. No issue with other applications.
Expected Behavior
The existingSecrets should not be overwriten by netbox chart.
NetBox Logs
The text was updated successfully, but these errors were encountered: