-
Notifications
You must be signed in to change notification settings - Fork 187
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
pxc-db pmm configure pmmserverkey #1586
Comments
Hey @weiss-m , so let me see if I understand the problem:
Let me think how we can do that. |
Just for my understanding, is the following assumption correct? The operator uses |
Yes, you are correct. |
Also raising this issue with the Percona Support, as we currently have to configure pmm manually (create the API key) on cluster creation, there should be a way to provide a pre-seeded api key. |
We use the pxc operator password auto generation feature for pxc accounts like root, xtrabackup ...
Unfortunately, pxc operator can't auto generate
pmmserverkey
.So we have to add the
pmmserverkey
manually to the existing k8s secret which already contains the auto generated passwords for root,xtrabackup ...https://github.com/percona/percona-xtradb-cluster-operator/blob/main/deploy/secrets.yaml#L11
https://docs.percona.com/percona-operator-for-mysql/pxc/monitoring.html#install-pmm-server
This is a manual step which we would like to avoid. We are using argocd for deployment of several pxc clusters.
So, one option would be, to use kustomize to add
pmmserverkey
to the existing k8s secret. This is not an option for us because we don't store passwords in clear text in git.We would like to use sealed secrets, but sealed secrets doesn't support addition of a key, value pair to an existing k8s secret.
Would it be possible to store auto generated and manual created credentials in separate k8s secrets?
The text was updated successfully, but these errors were encountered: