-
Notifications
You must be signed in to change notification settings - Fork 685
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
another key secret is getting created after restoring from backup #1588
Comments
What are the logs of your new controller? These are mine:
It detects an existing key and it doesn't create a new one. So in your case it should not be creating a new secret. |
with second secret created:
after removing
it got one secret but it also created a new one:
|
actually, I made a backup to test removing it in the previous message, and after restoring this backup and restarting controller i have 3 secrets :P
|
Which component:
controller
Describe the bug
After restoring from backup there are 2 secrets instead of 1, and it gets re-created after removing it
To Reproduce
Remove old secret created before restoring backup
Restart pod
See another secret getting created
You can delete it, but it gets re-created after restarting pod
Expected behavior
Possibility to properly back up and restore key used for encrypting secrets without introducing more keys as it makes further backups more complicated
Version of Kubernetes:
kubectl version
:Additional context
The main problem with this is that each backup/restore cycle requires +1 key to backup, and it is not possible to use older backup after restoring second time
The text was updated successfully, but these errors were encountered: