-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Don't recreate rethinkdb password when running on existing environment #17
Comments
If the pod (and stateful set) are removed, eg. uninstalled via ansible, then a subsequent ansible install will regenerate and overwrite the password secret. |
This actually is not an issue with secret generation but rather with the ansible/helm uninstall not removing persistent volumes (known issue, https://github.com/place-labs/k8s-helm/blob/master/ansible/README.md#limitations). |
Reopening as the issue is present when running current ansible playbook: a041740
Requires further investigation |
Due to the rethinkdbPassword release var not being found:
Previous step
However the same issue is present for postgresql, and all services should ideally also be using existing values (configMap/secret) when running |
No description provided.
The text was updated successfully, but these errors were encountered: