-
Notifications
You must be signed in to change notification settings - Fork 119
Status fields for resource health in VaultStaticSecret and VaultDynamicSecret resources #538
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thanks for submitting this enhancement request @dmavis - I like the idea of adopting Conditions for all VSO CRDs. |
Excellent! I completely agree that adding conditions to all CRDs would be the best option. In my internal work building Kubernetes controllers/operators, I've found using conditions to be a great, flexible way to communicate various status details and many Kubernetes-based tools automatically have some understanding of them. |
The missing status is unfortunate, since I tried to implement a custom health-indicator for ArgoCD, but there is nothing inside the For comparison, external-secrets.io properly sets the Currently, this is the best I can do: resource.customizations: |
secrets.hashicorp.com/VaultStaticSecret:
health.lua: |
hs = {}
hs.status = "Progressing"
hs.message = "Waiting for Secret creation..."
if obj.status ~= nil and obj.status.secretMAC ~= nil then
hs.status = "Healthy"
hs.message = ""
end
return hs But this only works correctly when deploying the object for the first time. If the |
I see that this feature request have changed milestone few times. Is there anything tricky? Would you accept external PR with this functionality? And if it's so do you have any requirements for implementation? |
Hello! is there any progress about this feature? We are also interested in correct resource health in ArgoCD |
Implemented in #1058 |
Is your feature request related to a problem? Please describe.
GitOps tools like Argo CD have the notion of resource health. When using Argo CD, the health of resources help indicate if any issues or errors exist in the application. Teaching Argo CD about the health of Vault secrets resources like VaultStaticSecret and VaultDynamicSecret enables those resources to accurately provide their health status to Argo CD. Both the
VaultStaticSecret
andVaultDynamicSecret
resources don't seem to have any fields in theirstatus
that would make that possible (e.g. avalid
orerror
field or even the standardconditions
field).Describe the solution you'd like
Add field(s) to the
status
ofVaultStaticSecret
andVaultDynamicSecret
resources that indicate the state of the secret, similar to thevalid
anderror
fields in theVaultPKISecret
,VaultAuth
, andVaultConnection
resources. Even having a standardconditions
field would help communicate any issues and provide easy access to any error details.Describe alternatives you've considered
Clear communication of the resource status is critical when using the extensible, declarative resource model provided by Kubernetes, so any alternatives or workarounds would probably not be appropriate for this use case
The text was updated successfully, but these errors were encountered: