Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

generate secres manually #2

Merged
merged 1 commit into from
May 12, 2021
Merged

Conversation

raresfirebolt
Copy link
Owner

@raresfirebolt raresfirebolt commented Mar 17, 2021

Want to add the following improvements:

  • Secret can now be manually generated and don't need to be saved in git.
  • If external access is not required, the LoadBalancer can be disabled
  • Docker image is no longer available so I have updated it

@raresfirebolt raresfirebolt force-pushed the remove_secrets_from_git branch 2 times, most recently from 528c6e2 to 36363f3 Compare March 18, 2021 12:36
@@ -23,6 +23,8 @@ The following table lists the configurable parameters of the TimescaleDB Helm ch
| `image.tag` | The version of the image to pull | `pg12.5-ts2.0.0-p0`
| `image.pullPolicy` | The pull policy | `IfNotPresent` |
| `credentials.accessNode.superuser`| Password of the superuser for the Access Node | `tea` |
|`access.service.type` | Setup external access using LoadBalancer or ClusterIP | `LoadBalancer` |
| `credentials.fromValues` | Load credentials from values.yaml | `true` |
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

need to make this beautiful


Then generate the secrets
```console
random_password () { < /dev/urandom tr -dc _A-Z-a-z-0-9 | head -c32; }
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this does not belong here

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you give more details ?

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this function is already defined above, where it is being used
you are not using it here, so why defining it again ?

pullPolicy: IfNotPresent

#enable external access using LoadBalancer
access:
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

accessNode is less confusing :-)

@@ -38,6 +38,25 @@ Alternatively, a YAML file that specifies the values for the parameters can be p
```console
helm upgrade --install my-release -f myvalues.yaml .
```
### Secret override

In order to not have secrets stored in git, you can manually generate secrets for timescaledb-access endpoint and timescaledb-data endpoint.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this is not necessarily related to git

@@ -108,6 +127,13 @@ our [TimescaleDB > Tutorial: Scaling out TimescaleDB](https://docs.timescale.com
to create distributed hypertables and start using multinode TimescaleDB.

### Connecting from another pod
If you are connecting from another pod you can disable external access completely by changing the service typpe from LoadBalancer to ClusterIP. Edit the following in values.yaml:
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

service type

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this should fall under ## Connecting from outside Kubernetes

Copy link
Owner Author

@raresfirebolt raresfirebolt Mar 18, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am confused here. Isn't the purpose of ClusterIP to allow access only inside the kubernetes cluster ? Why should this be moved to ## Connecting from outside Kubernetes

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

because there you say, in order of connecting from outside, 1.2.3, otherwise you can use type: ClusterIP
at any rate this is not related to ### Connecting from another pod since every service type will have here the same instructions

@@ -38,6 +38,20 @@ Alternatively, a YAML file that specifies the values for the parameters can be p
```console
helm upgrade --install my-release -f myvalues.yaml .
```
### Secret override

Instead of setting secrets in values.yaml, they can be manually generated. The following example is for timescaledb-access endpoint and timescaledb-data endpoint.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

too many spaces in some places, and I think using the word endpoint might be confusing here
need to use the right terminology, or otherwise rephrasing it differently

@@ -108,6 +122,13 @@ our [TimescaleDB > Tutorial: Scaling out TimescaleDB](https://docs.timescale.com
to create distributed hypertables and start using multinode TimescaleDB.

### Connecting from another pod
If you are connecting from another pod you can disable external access completely by changing the service type from LoadBalancer to ClusterIP. Edit the following in values.yaml:
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

as already stated this does not belong here, and the description should also be adapted

@raresfirebolt raresfirebolt force-pushed the remove_secrets_from_git branch 2 times, most recently from 9366ec8 to 6c16b58 Compare April 26, 2021 08:57
@raresfirebolt raresfirebolt force-pushed the remove_secrets_from_git branch from 4c2057d to 329d7e3 Compare April 27, 2021 13:25
@raresfirebolt raresfirebolt merged commit cac1c4f into master May 12, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants