-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
K8s Secret Inline Mutation annotation sometimes is not respected #77
Comments
Additional note: Hashicopr Vault official helm chart deploys a couple of Vault services. Individual check on the Ambassador debug admin console, indicates an error when annotation is added to Service 1 that it can be routed to Service 2, disabling Service 2 is optional, but HA mode will not work if it is disabled. Tested out with removing Service 2 did not cause the problem to be resolved, which eliminates the possibility of being a wrong service routing on the Kubernetes/Ambassador part. |
Describe the bug:
Vault Secrets webhook is sometimes not respecting k8s annotation for
vault-env
annotation provided for the Secret object to have inline mutated:
http://vault.vault.svc.cluster.local:8200
Error thrown:
Expected behaviour:
Inline mutation should put the value of the Secret in the k8s Secret Object
Steps to reproduce the bug:
Continuously trigger the keycloak configurator job or any kind of secret creation via helm chart webhook then randomly would not respect the annotations
vault-addr
and default to the originalhttps://vault:8200
Additional Information:
Vault is running with tls_disabled: true
Vault server is responding with HTTP
We are exposing vault via Ambassador external DNS
Environment details:
Can be provided if necessary, for the time being, do not have clearance to do so
/kind bug
The text was updated successfully, but these errors were encountered: