You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A minio tenant seems to require a configuration block, which should point to a secret containing a base64-encoded representation of several environment variable. This makes it very cumbersome to change the config (or generate it in the first place), as one need to perform a base64-encoding of a multi-line string. It would be much better if the tenant allowed referencing a secret with individual keys to represent environment variables. This could be piped directly into minio contaner's envFrom attribute (https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#envfromsource-v1-core).
For us, this would let us keep Minio console passwords in an external secrets mgmt system, and sync that with a Kubernetes secret, which would then be used by minio.
A minio tenant seems to require a
configuration
block, which should point to a secret containing a base64-encoded representation of several environment variable. This makes it very cumbersome to change the config (or generate it in the first place), as one need to perform a base64-encoding of a multi-line string. It would be much better if the tenant allowed referencing a secret with individual keys to represent environment variables. This could be piped directly into minio contaner'senvFrom
attribute (https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#envfromsource-v1-core).For us, this would let us keep Minio console passwords in an external secrets mgmt system, and sync that with a Kubernetes secret, which would then be used by minio.
I've tried supplying a tenant config like this:
and have the configuration secret's decoded value be:
but it does not work - the operator is intent on reading the root user/password from the configuration secret's
config.env
value and nowhere else:We're having real problems storing credentials in a secure manner because of this.
We're running the helm chart operator-7.0.0.
The text was updated successfully, but these errors were encountered: