Mickaël Canévet
Mickaël Canévet
This is definitely a behavior I also noted, but unfortunately I can't figure out how to fix this. @raphink any idea?
@raphink I think we must check if the env is removed in the read function like we did for `rancher_stack` resource for example.
@raphink it looks like it is already implemented https://github.com/terraform-providers/terraform-provider-rancher/blob/master/rancher/resource_rancher_environment.go#L155-L159 but @cryptobioz also noted this failing behavior. Any idea?
I still have the issue.
Have you tried to escape the curly braces in the ConfigMap. i.e, using: ``` "queryExpression": "sum(rate(container_cpu_usage_seconds_total{pod=~\"{{`{{.name}}`}}\", image!=\"\", container!=\"POD\", container!=\"\", container_name!=\"POD\"}[5m])) by (pod)" ``` instead of: ``` "queryExpression": "sum(rate(container_cpu_usage_seconds_total{pod=~\"{{.name}}\", image!=\"\", container!=\"POD\",...
For me it works with this fix: https://github.com/argoproj-labs/argocd-extension-metrics/pull/65/files
@vyaghras for example I'd like my users to be able to download images from Gitlab container registry or JFrog with having to deploy a Secret and specify ImagePullSecret. I could...
According to [this documentation](https://kubernetes.io/blog/2022/12/22/kubelet-credential-providers/#how-it-works), it should be quite easy to create a credential provider. The question is how to do it in a non-opinionated way so that it can be...
Actually we could have a generic `aws-secretsmanager-credential-provider` that would take the secret ARN as environment variable, we'd just need to be able to specify the binary location to that we...
@yeazelm we would still need to be able to pass the binary location in order to be able to instantiate it multiple times. I'll try to create an AWS Secrets...