You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request. Searching for pre-existing feature requests helps us consolidate datapoints for identical requirements into a single place, thank you!
Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request.
If you are interested in working on this issue or have submitted a pull request, please leave a comment.
Overview of the Issue
When deploying consul using the helm chart and acl:manageSystemACLs = true a secret is created in Kubernetes with the name ${name}-bootstrap-acl-token. The problem comes when you uninstall the helm chart that the secret is not deleted.
Reproduction Steps
Deploy consul using this helm chart and acl:manageSystemACLs = true to create the bootstrap secret.
Execute helm uninstall and delete the chart.
Notice that the secret is not deleted.
Expected behavior
The secret is deleted after helm uninstall.
Environment details
consul-k8s version: 1.3.1
values.yaml: any values that creates a Kubernetes secret.
The text was updated successfully, but these errors were encountered:
@Conacious Happy to review a PR that implements the desired behavior. I believe we wanted the ACL bootstrap to be around in cases of recovery. For anyone else upvoting, do you typically wipe out all secrets for a cluster during uninstall or do you re-use secrets from previous install for consistency?
Community Note
Overview of the Issue
When deploying consul using the helm chart and
acl:manageSystemACLs = true
a secret is created in Kubernetes with the name${name}-bootstrap-acl-token
. The problem comes when you uninstall the helm chart that the secret is not deleted.Reproduction Steps
acl:manageSystemACLs = true
to create the bootstrap secret.Expected behavior
The secret is deleted after helm uninstall.
Environment details
consul-k8s
version:1.3.1
values.yaml
: any values that creates a Kubernetes secret.The text was updated successfully, but these errors were encountered: