-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Track source sercret for changes. #36
Comments
+1 |
Voting for this as well, we are using secrets generated by the Zalando PostgreSQL Operator, which is in its own namespace, however, consumers of the database services live ion other namespaces. The Zalando operator implements automatic secret rotation, hence the need to monitor and propagate changes We will also be looking at a Hashicorp Vault integration via the External Secrets Manager Operator, in this use case, the Vault will rotate the secret and we need it have it propagate via ClusterSecret if wee can |
IN case anyone else is interested, we intend to also use ClusterSecret with https://github.com/stakater/Reloader to trigger pod and deployment restarts on secret rotations |
Hi, news to this feature ? I want use Cluster Secret but I use Sealed Secret, and so without watch source secret is not possible 😢 . I am not python developer to help sorry |
I tried do that way, but get a |
this pr: #78 . introduces "REPLACE_EXISTING" var. When is set to true. all existing secrets will be replaced/updated. |
When using the source secret form another secret, we have to track for changes in the source and react to them.
for the use case at #35
The text was updated successfully, but these errors were encountered: