When migrating the `pod-secrets` Secret to a SealedSecret, I accidentally created it using the `--from-file` instead of `--from-env-file` argument to `kubectl secret create generic`. This had the effect of creating a single key named `pod.secrets` with the entire contents of the file as its value. This broke backups to MinIO, since the PostgreSQL containers could no longer read the credentials from the environment. Regenerating the SealedSecret with the correct arguments resolves this issue. |
||
---|---|---|
.. | ||
ui | ||
.gitignore | ||
api-service.yaml | ||
certificate.yaml | ||
default-cluster.yaml | ||
kustomization.yaml | ||
namespace.yaml | ||
operator-service-account-rbac.yaml | ||
operatorconfiguration.crd.yaml | ||
pod.env | ||
postgres-operator.yaml | ||
postgresql-operator-configuration.yaml | ||
postgresteam.crd.yaml | ||
secrets.yaml |