-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
To dynamically load IaaS credentials during runtime using secrets mount. #301
To dynamically load IaaS credentials during runtime using secrets mount. #301
Conversation
10fe03a
to
65b3879
Compare
I ran a control plane migration test on azure, and copying etcd backups seems to work fine with the new way that secrets are used now. |
I tested compaction jobs on aws, az, and gcp, and they all ran ok with these new secret changes |
52db5d8
to
0035330
Compare
I have rebase my PR on latest master. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
What this PR does / why we need it:
This PR integrates the feature to dynamically load IaaS credentials during runtime using secret file mount with etcd-druid.
Which issue(s) this PR fixes:
Fixes #422
Special notes for your reviewer:
Release note:
Set File Path through Env: `<ProviderName>_APPLICATION_CREDENTIALS`