-
Notifications
You must be signed in to change notification settings - Fork 981
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
allow populating pod environment from Secrets #480
Comments
Is there a reason you cannot use iam/pod iam role for this? |
That would be |
Are there any other alternatives, maybe just mount these credentials and let the client library to discover it? If I'm not mistaken, this mentioned in the minio documentation |
It's the wal-g that needs those environment variables. It would need the volume with credentials mounted so the file But all the Pods created by postgres-operator would need the volume and I see no way to create it in the postgres-operator configuration or the postgresql object right now. Is there a way to add custom volume to all spilo containers and I'm missing it? |
Not yet, but probably we can leverage #535 for that purpose? |
I find #535 suboptimal as I still would need to run some script to turn secrets from Minio format (name: value) into
or maybe keep two secrets in sync with same values but different format. |
Closing this issue as now supported with #946 being merged. |
It would be nice to populate env variables from secrets e.g.
AWS_ACCESS_KEY_ID
andAWS_SECRET_ACCESS_KEY
so they won't be exposed in ConfigMaps.The text was updated successfully, but these errors were encountered: