cloudwiz

Results 32 comments of cloudwiz

If there is no well known issues/concerns I can also make a PR for that

Here are the hooks I have which does have the k8ss hook in place ``` kubectl get validatingwebhookconfigurations NAME WEBHOOKS AGE actions-runner-controller-validating-webhook-configuration 3 132d aks-node-validating-webhook 1 72d cert-manager-webhook 1 132d...

And yes - the secret we have is in the same namespace with both the operator and cassandra cluster. We only have one cassandra cluster per k8s cluster at the...

We use flux to deploy things This is a normal helm release deployment which seem to be all default values ``` apiVersion: helm.toolkit.fluxcd.io/v2beta1 kind: HelmRelease metadata: name: k8ssandra namespace: temporal-state...

As all our secrets are in the same namespace there is no issue with the secrets, there was only the issue when I dropped the one matching DC name cause...

Some clarification from my end to avoid confusion. I did not actually directly updated the Cassandra DC (it was tempting) cause this would likely have some consequences if done bypassing...

Here is the sequence, let me know if anything else needs clarifying > everything is done in the single namespace 1. install k8ss with a helm 2. create a secret...

It would help if audiences can be provided as part of the kubernetes auth spec. E.g. hashicorp vault operator [allows supplying the info](https://github.com/hashicorp/vault-secrets-operator/blob/2a353232094af20dc6a220f6abee0d04449ad051/test/integration/vaultpkisecret_integration_test.go#L176)

[v15-alpha](https://github.com/cert-manager/cert-manager/releases/tag/v1.15.0-alpha.0) version contains an enhancement which allows you to provide additional audiences to the service account auth. It works for us. [documentation](https://deploy-preview-1455--cert-manager-website.netlify.app/docs/configuration/vault/#secretless-authentication-with-a-service-account-external-vault)

@javierguzman > So does audiences field go under serviceAccountRef It goes under, there was another PR which moved it under as it made more sense. I guess you are also...