-
Notifications
You must be signed in to change notification settings - Fork 190
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Request to add helm chart secret options for Trino Gateway chart #306
Comments
What default secret are you talking about? Use |
Sorry. This is for the gateway chart. |
Can you post your |
The helm chart takes the config section of the values and creates a secret (trino-gateway-configuration). This holds the postgres db creds and admin account password. I want to create this secret beforehand and not put it into the values. I will store the secret encrypted in the git and deploy it with argocd. If I remove the config section the helm chart will not deploy. If I put it in as empty it overwrites my secret with default values. I'm looking for an option that if set will ignore the config section and take the existing secret instead. As it stands I have to clone the repo and remove the secret template to bypass this. note: I have made it work. I'm sure others will want to keep their secrets out of the main values file as well. This is the section of values that will be used to create the secret, and is used if the secret template is not removed, overwriting the existing secret.
Here is my pre-created secret:
|
That makes sense .. would you want to send a PR to implement a similar approach on how its done in the trino chart @chcro or @wccropper .. Alternatively @willmostly might get around to it .. |
When deploying the chart, I wanted to pre-create the secret for the config as an encrypted sealed-secret, as it holds credentials. I am doing this with ArgoCD. The default helm chart overwrites the existing secret with default data. I had to copy the helm chart locally and remove the secret.yaml template to stop this from happening. Can there be a config.secret flag to use existing secret, skipping the secret creation?
The text was updated successfully, but these errors were encountered: