1
0
Fork 0
kubernetes/postgresql
Dustin cf7ec7dd64 postgresql: Fix pod secrets
When migrating the `pod-secrets` Secret to a SealedSecret, I
accidentally created it using the `--from-file` instead of
`--from-env-file` argument to `kubectl secret create generic`.  This had
the effect of creating a single key named `pod.secrets` with the entire
contents of the file as its value.  This broke backups to MinIO, since
the PostgreSQL containers could no longer read the credentials from the
environment.  Regenerating the SealedSecret with the correct arguments
resolves this issue.
2023-10-19 07:12:16 -05:00
..
ui postgresql: Deploy Postgres Operator 2023-05-12 12:13:24 -05:00
.gitignore postgresql: Deploy Postgres Operator 2023-05-12 12:13:24 -05:00
api-service.yaml postgresql: Deploy Postgres Operator 2023-05-12 12:13:24 -05:00
certificate.yaml postgresql: Use a private CA-signed TLS cert 2023-10-18 18:47:09 -05:00
default-cluster.yaml authelia: Convert to a stateless service 2023-10-19 07:12:02 -05:00
kustomization.yaml postgresql: Set instance label for Argo CD 2023-10-14 21:32:29 -05:00
namespace.yaml postgresql: Deploy Postgres Operator 2023-05-12 12:13:24 -05:00
operator-service-account-rbac.yaml postgresql: Deploy Postgres Operator 2023-05-12 12:13:24 -05:00
operatorconfiguration.crd.yaml postgresql: Deploy Postgres Operator 2023-05-12 12:13:24 -05:00
pod.env postgresql: Deploy Postgres Operator 2023-05-12 12:13:24 -05:00
postgres-operator.yaml postgresql: Deploy Postgres Operator 2023-05-12 12:13:24 -05:00
postgresql-operator-configuration.yaml postgresql: Use a private CA-signed TLS cert 2023-10-18 18:47:09 -05:00
postgresteam.crd.yaml postgresql: Deploy Postgres Operator 2023-05-12 12:13:24 -05:00
secrets.yaml postgresql: Fix pod secrets 2023-10-19 07:12:16 -05:00