Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Not managed credential is getting deleted by operator along with postgresql resource #2022

Open
rhrytskiv opened this issue Aug 29, 2022 · 4 comments

Comments

@rhrytskiv
Copy link

Which image of the operator are you using? e.g. registry.opensource.zalan.do/acid/postgres-operator:v1.8.2
Where do you run it - cloud or metal? Kubernetes or OpenShift? [Bare Metal K8s]
Are you running Postgres Operator in production? [not yet]
Type of issue? [feature requrest]

So to have managed creds I have to create them beforehand as a secret with Zalando specific name, and then if I delete the postgresql resource, operator deletes this credential as well, which is unwanted. Could you make operator label somehow resource with additional label and only then delete the cred?

@FxKu
Copy link
Member

FxKu commented Aug 29, 2022

I thought we already have an option to not remove the secrets. Does not seem to be the case. You can create a new option so that the operator does not delete secrets.

Btw, secrets are created by the operator when they are not found. No need to create them beforehand.

@rhrytskiv
Copy link
Author

Thanks, I've no experience in go development unfortunately, maybe someone else coukld take a look.

Well I'm creating beforehand because I don't want randomly generated secret, I'm generating it with terraform, putting it into aws ssm param store and then I want to use that value as pg user cred. It would've been nice if we could just supply that as a parameter to postgresql resource in the first place though.

@kannanvr
Copy link

@FxKu , I will take up this issue. Here we need to implement the new parameter for not to manage the secret. So, the user can create the password as a secret and delete whenever they want.

Please confirm the above implementation. So that i will start implement it

@AmisGit
Copy link

AmisGit commented Sep 26, 2023

@FxKu Hi, i also have the same problem, we need to keep current secrets when we remove any of Postgresql object from Kubernetes! Please help to move this issue in next step

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants