helm: allow further customization through additional flags and secrets#4333
helm: allow further customization through additional flags and secrets#4333derekperkins merged 15 commits intovitessio:masterfrom
Conversation
derekperkins
left a comment
There was a problem hiding this comment.
I think this is looking great, thanks for contributing back upstream!
Do you have any use cases for adding flags to mysqlctld?
|
Also, I think it'd be helpful to add some of the examples you have above to the |
Surprisingly, not yet. Traffic encryption is not necessary because it only listens on the local socket and everything else can be configured using
I added three sections to the README including gRPC TLS configuration, slave replication traffic encryption and at rest encryption using the vault plugin. |
…ure transport encryption. Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
…al newlines. Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
… rest encryption using the vault plugin. Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
|
This is looking really great, especially the documentation. Another PR was merged yesterday that introduced a few new places that use Once those are taken care of, I think it LGTM. |
Signed-off-by: Niklas Voss <niklas.voss@gmail.com>
Merged from current master and added |
|
@trevex I merged your ceph support PR first which is causing a merge conflict here. Can you resolve that? When that's done, I'll go ahead and merge this PR (just got merge rights). |
|
@derekperkins All merge conflicts resolved. |
In out cluster we use transport encryption for all components of vitess. Currently we use the upstream helm chart and apply several patches, because we are not able to configure transport encryption with just the helm chart.
The implemented changes:
extraMyCnfonly include files with*.cnfextension to be able to provide other configuration files as well, e.g. percona vault keychain configurationextraFlagsandsecretsto vitess components:Example values:
The
vtctlclientsection is new to the values file and is used by all components that interact using thevtctlclient(e.g. the init jobs and orchestrator). At the current time I would like to get some early feedback, whether this approach works for vitess, while I continue with testing in our local development cluster.EDIT:
All secrets are always mounted at
/vt/usersecrets/$secretname/