-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot deploy operator to multiple namespaces #38
Comments
I think this is because the CRD is defined in the helm |
Small note: you do have to change the Helm repo URL to https://1password.github.io/connect-helm-charts to get the updated chart. |
Amazing!
Thanks a lot for your support. I will check it out tonight and report
back to you.
On Tue, 4 May 2021 at 14:19, Floris van der Grinten < ***@***.***> wrote:
v1.2.0
<https://github.com/1Password/connect-helm-charts/releases/tag/connect-1.2.0>
has just been released, so the --skip-crds flag should work now. Could
you try again?
Small note: you do have to change the Helm repo URL to
https://1password.github.io/connect-helm-charts to get the updated chart.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#38 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AADXGGJCJAP5B3XUUWSOOA3TL7X53ANCNFSM43XOCMFA>
.
--
Regards
Mike
|
@florisvdg I can confirm this has now resolved the issue. 🙏 |
Hey, this seems to have returned in v1.5. If I downgrade to v1.4 then it works. |
Your environment
Operator Version: 1.0.0
Connect Server Version: 1.0.0
Kubernetes Version:1.18.16-gke.502
What happened?
What did you expect to happen?
The second install command with skip-crds would not create the CRD again
Steps to reproduce
Create two environments for connect on 1password
generate a token and credentials for each
create two namespces
deploy connect with the operator to the first namespace
attempt to create the operator in a second namespace
Notes & Logs
Not entirely sure if this is me missing something obvious or wether it's the checks for those annotiation labels causing the issues. Essentially we have 4 isolated namespaces in our cluster. We want to have 4 environments each with it's own access-token and credentials which has access to a single vault for (one per namespace)
The text was updated successfully, but these errors were encountered: