-
Notifications
You must be signed in to change notification settings - Fork 321
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
helm:After destroying the helm chart the secrets for token /Service Account/PSP are not getting deleted #678
Comments
Hi Juned, for now you'll need to manually delete the secrets and the persistent volume claims:
|
Is this secret deletion going to be part of helm uninstall in any upcoming consul helm releases ? It would be great to have them. |
we could potentially tie deleting secrets to deleting a resource like the server statefulset or the client daemonset. Only danger with that is that someone might accidentally delete critical secrets. |
Right. I followed up with this document https://www.consul.io/docs/k8s/operations/uninstall to perform a cleanup and it works well. |
* Add field descriptions for Service Intentions CRD
We now have a CLI that is currently in Alpha, and this would handle deletion of PVCs, Service Accounts and secrets for you: https://www.consul.io/docs/k8s/k8s-cli#uninstall. Closing the issue as that is better addressed through a CLI interface instead of Helm. |
If you deploy the helm chart with
bootstrapACLs: true
the helm chart creates the following secretsThose are not getting deleted if we delete the helm chart.
This causes the issue if you redeploy the helm chart again.
The text was updated successfully, but these errors were encountered: