-
Notifications
You must be signed in to change notification settings - Fork 270
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
caFile is ignored when using own secret #805
Comments
Hi @MoFrei, your workaround will work. To fix the bug,
If possible, can you submit a PR to fix this? |
This issue is stale because it has been open for 30 days with no activity. |
This issue was closed because it has been inactive for 14 days since being marked as stale. |
Today I discovered two minor bugs related to the use of self-created secrets:
When you use a self-created Secret to store your token (secret.create = false) the global option for an caFile is not working.
This (correctly) leads to an error with untrusted HEC endpoint certificates, since the caFile is not added to the (self-created) Secret
The documentation should be changed so that the CAFile must also be included in the secret
when adding the CAFile to the Secret, the CA is not used, because the ENV variable "SSL_CERT_FILE" is only used when the CAFile is imported via values.yaml
There should be an additional variable to allow the creation of the ENV variable
However, as a workaround you can add a dummy entry to your values.yaml
splunk-connect-for-kubernetes/helm-chart/splunk-connect-for-kubernetes/charts/splunk-kubernetes-logging/templates/daemonset.yaml
Line 86 in 64a4405
The text was updated successfully, but these errors were encountered: