-
Notifications
You must be signed in to change notification settings - Fork 536
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set s3 credentials with command line flags #308
Comments
Hi, |
Hi! You can use the flags |
Thanks for the information, I did as follows on the values.yaml
|
Hi @orcr !
no luck also using the flags in the startup command:
Thanks! |
This is how I put together previous comments to use Rook/Ceph object storage. Tempo community Helm chart version 1.6.1 values snippet. tempo:
storage:
trace:
backend: s3
s3:
bucket: tempo-bucket
endpoint: rook-ceph-rgw-ceph-objectstore.rook-ceph.svc
access_key: ${AWS_ACCESS_KEY_ID}
secret_key: ${AWS_SECRET_ACCESS_KEY}
insecure: true
wal:
path: /var/tempo/wal
extraArgs: { config.expand-env=true }
extraEnv:
- name: AWS_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
name: tempo-bucket
key: AWS_ACCESS_KEY_ID
- name: AWS_SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
name: tempo-bucket
key: AWS_SECRET_ACCESS_KEY Rook ObjectBucketClaim manifest. apiVersion: objectbucket.io/v1alpha1
kind: ObjectBucketClaim
metadata:
name: tempo-bucket
spec:
bucketName: tempo-bucket
storageClassName: ceph-bucket |
Is your feature request related to a problem? Please describe.
Currently the s3 credentials (access key and secret) have to be configured in the config file. This makes it hard/impossible to use a vault service which supplies the credentials as a k8s secret.
Describe the solution you'd like
Allowing the s3 credentials to be set using command line flags makes it possible to bind the secret as env vars and use the env vars as container args.
E.g.:
The text was updated successfully, but these errors were encountered: