This repository has been archived by the owner on Jul 26, 2022. It is now read-only.
Replies: 1 comment
-
While KES should really only update the status fields for an externalsecrets resource. So I find it unlikely for it to be causes by KES. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
We use the external secrets manager to maintain a set of secrets read from ssm properties in aws. We've been using it quite successfully for about a year at this point. The external secret manifests are being generated and updated by a terraform project to be read by the external secrets manager.
On one occasion, I noticed that one of the external secrets manifests became corrupted where by the spec.data.name value became unset. I found this quite unusual because any attempt that I make to create a manifest via kubectl or terraform in this was is rejected during validation.
Is it possible that the external secrets manager may have unset the spec.data.name field?
Here is some output of commands that I had run at the time of the issue:
The first one here, was broken in the way I describe above.
The following secret in a different namespace was fine.
Is it possible that the external secrets manager might inadvertently edit the external secret in this way?
Beta Was this translation helpful? Give feedback.
All reactions