-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configure ArgoCD + Vault for svc-bip-api #3037
Labels
Comments
lisac
added
needs-refinement
needs refinement before it's ready to work
VRO-team
deployments
labels
May 23, 2024
This was referenced May 23, 2024
lisac
changed the title
[draft] Configure ArgoCD + Vault for svc-bip-api
Configure ArgoCD + Vault for svc-bip-api
May 29, 2024
This should be done after we move all services over. |
Next steps: Make tickets to move all services to ArgoCD to prodtest, after we do this determine the cutover plan, then revisit secrets management and get this working and then have a separate ticket for prod. |
4 tasks
meganhicks
added
ready to work
and removed
needs-refinement
needs refinement before it's ready to work
labels
Aug 21, 2024
This was referenced Aug 21, 2024
status: still working on this. not blocked, more that it's a learning curve for me. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
User Story
As a VRO engineer, I would like to be able to use ArgoCD for VRO deployments. As a first step: I would like to be able to use ArgoCD to deploy
svc-bip-api
to environments dev, qa, and sandbox with minimal manual intervention.Notes about work
This ticket depends on completion of #3030 and targets Problem 3 that was described in that ticket:
Recommendations
Acceptance Criteria
(in the scope of environments dev, qa, and sandbox; this does NOT apply to higher environments)
svc-bip-api
to dev, qa, and sandbox successfully retrieve secrets as stored in Vault. There should be no log messaging that leaks the structure of secrets.Note
In order to complete AC1, the current structure of our secrets might need to be altered to comply with the requirements for the Argo Vault Plugin which will require changes to the application as well.
Related
This is a follow up to the deployment improvement workshop (recap) and #2781
The text was updated successfully, but these errors were encountered: