-
Couldn't load subscription status.
- Fork 3
feat: store kibana secrets #534
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Some TODO: remain in the variable validation sections. |
|
From the fully configurable test: The kibana system and app login password secrets are added as secrets manager secrets. |
|
During a manual run the secrets were intercepted in secrets manager and had expected random values in them. |
|
/run pipeline |
|
@shemau looks good, but are upgrades safe? I think so just double checking |
|
It is safe upgrading with no migration issues. The original secret is still in the secrets array. The two passwords already exist and remain unchanged, they are just added to the secrets array. The upgrade (assuming kibana is on AND a secret manager CRN is passed) will just add two new secret resources. |
|
/run pipeline |
|
This change does not include any password generation rules. It fails with re-running to see if this always happens, or if there is intermittent issue with a very small chance that all 32 characters are not lower case. |
|
/run pipeline |
|
🎉 This PR is included in version 2.4.0 🎉 The release is available on:
Your semantic-release bot 📦🚀 |
Description
Store kibana account secrets in secrets manager, when secrets manager is supplied to a deployable architecture.
#529
Release required?
x.x.X)x.X.x)X.x.x)Release notes content
Run the pipeline
If the CI pipeline doesn't run when you create the PR, the PR requires a user with GitHub collaborators access to run the pipeline.
Run the CI pipeline when the PR is ready for review and you expect tests to pass. Add a comment to the PR with the following text:
Checklist for reviewers
For mergers