Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secrets Provider image not updating secrets file when template under ConfigMap is updated (push-to-file approach) #545

Open
1 of 3 tasks
kanth222 opened this issue Jul 15, 2024 · 0 comments
Labels

Comments

@kanth222
Copy link

Summary

The Secrets Provider image for Kubernetes is not updating the secrets file when the template in the ConfigMap is updated while using the push-to-file approach.

Steps to Reproduce

  1. While deploying application make sure you are reading template from config map.
  2. Once the application is deployed along with secrets provider image as sidecar, validate secrets file is generated and accessible by application container.
  3. Now update the template in config map to add additional secret (you may use existing variable with different key in template file).
  4. Wait for 1-2 mins to pick the template in shared volume mount to be updated.

Expected Results

The target secrets file must be updated as per template provided in config map.

Actual Results

The actual secrets file is not getting updated while template with in the shared volume is getting updated.

Reproducible

  • Always
  • Sometimes
  • Non-Reproducible

Version/Tag number

What version of the product are you running? Any version info that you can
share is helpful. For example, you might give the version from Docker logs,
the Docker tag, a specific download URL, the output of the /info route, etc.

Using the latest tag image.

Environment setup

Running in GKE cluster.

Additional Information

Add any other context about the problem here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Development

No branches or pull requests

1 participant