-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(tf): create password for read-only SQL user on staging #1658
Conversation
This looks good to me schematically. I have at least a small worry that the new method we're now using for working through modules might have a side effect of us rotating the other secrets that we don't want to touch My "plan" of this PR looks like:
Did you already try this locally and confirm this "change" is actually a noop rather than regenerating the passwords? |
I didn't see any existing credentials being rotated when I applied this change in my local environment. However, it would be good if you could double-check this in your environment as well. Judging by the plan outputs, it should work the same way on staging, but I can't say that for certain due to the added secrets module step for staging. I checked before and after applying the changes using: kubectl get secret --namespace default sql-secrets-init-passwords -o yaml This is what my plan looked like:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Tested it locally for me and the "binary blob change" is just the new observer being added
Process for creating a new
observer
user: