-
Notifications
You must be signed in to change notification settings - Fork 16.7k
[stable/grafana] datasource provisioning with sidecar should be done trough secrets #13492
Comments
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Any further update will cause the issue/pull request to no longer be considered stale. Thank you for your contributions. |
activity! |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Any further update will cause the issue/pull request to no longer be considered stale. Thank you for your contributions. |
activity! |
I would like to work on this, but the upstream sidecar PR is not being merged... |
Since the sidecar PR has been merged, I could take a stab at adding this feature (should be fairly easy now), if this is in line with the maintainers goals. |
yeah go for it! |
Would this make it possible to have most of the provisioning details in a configmap, but load just the secret values from a secret? Right now we have secrets (api keys, etc.) in Kubernetes secrets, but the rest of our details in configmaps, and it'd be great to be able to have the sidecar merge those automatically (instead of us having to write something to do it). |
That PR (and the sidecar behind it) do not support that. |
https://github.com/helm/charts/blob/master/stable/grafana/templates/clusterrole.yaml and
With this change, does the role need to include secrets in addition to configmaps? |
Good point. I somehow missed the normal role and only updated the clusterrole
|
* [stable/grafana] Allow secrets for sidecar (helm#13492) Updated the sidecar image to version 0.0.18 This allows also using secrets for volume mounts This way the dashboard and datasource import can be extended to those datatypes Signed-off-by: Sergej Herbert <[email protected]> * [stable/grafana] Allow secret - review (helm#13492) - keep the appVersion the same - bump minor version - add missing apostrophe Signed-off-by: Sergej Herbert <[email protected]> * [stable/grafana] Allow secret - review helm#2 (helm#13492) - enable sidecar resource secrets and configmaps by default - update readme to indicate secret preference for datasources Signed-off-by: Sergej Herbert <[email protected]>
* [stable/grafana] Allow secrets for sidecar (helm#13492) Updated the sidecar image to version 0.0.18 This allows also using secrets for volume mounts This way the dashboard and datasource import can be extended to those datatypes Signed-off-by: Sergej Herbert <[email protected]> * [stable/grafana] Allow secret - review (helm#13492) - keep the appVersion the same - bump minor version - add missing apostrophe Signed-off-by: Sergej Herbert <[email protected]> * [stable/grafana] Allow secret - review #2 (helm#13492) - enable sidecar resource secrets and configmaps by default - update readme to indicate secret preference for datasources Signed-off-by: Sergej Herbert <[email protected]>
* [stable/grafana] Allow secrets for sidecar (helm#13492) Updated the sidecar image to version 0.0.18 This allows also using secrets for volume mounts This way the dashboard and datasource import can be extended to those datatypes Signed-off-by: Sergej Herbert <[email protected]> * [stable/grafana] Allow secret - review (helm#13492) - keep the appVersion the same - bump minor version - add missing apostrophe Signed-off-by: Sergej Herbert <[email protected]> * [stable/grafana] Allow secret - review #2 (helm#13492) - enable sidecar resource secrets and configmaps by default - update readme to indicate secret preference for datasources Signed-off-by: Sergej Herbert <[email protected]>
We can define
sidecar.datasources.enabled
to deploy a sidecar that use configmaps with corresponding label for Grafana datasources provisioning.This datasource configuration may contains sensitive data in
secureJsonData
field (other sensitive fields are now deprecated) : passwords, private keys, etc...So, it'll be more secure to store these datasource configuration on Kubernetes using a secret and not a configmap.
The text was updated successfully, but these errors were encountered: