Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unable to use helm chart with postgresql database #82

Closed
Be-El opened this issue Apr 25, 2023 · 5 comments
Closed

Unable to use helm chart with postgresql database #82

Be-El opened this issue Apr 25, 2023 · 5 comments
Assignees

Comments

@Be-El
Copy link

Be-El commented Apr 25, 2023

Hi,

the helm chart is focusing on cockroachdb deployments, which may be fine for cloud based setup.

We want to use zitadel on-premise with a baremetal postgresql cluster. Unfortunately the chart requires a number of cockroachdb related secret, certificates etc.

Do you have instructions how to use the chart with postgresql? Is it sufficient to fake the content of the required secrets?

@eliobischof
Copy link
Member

Do I understand you correctly that you would like to have the secret data keys configurable for these secrets?

Other connection secrets like username, password, host etc are configurable in the ZITADEL yaml as described here. For secret ZITADEL config, you can use the secretConfig property in the Helm values.

@Be-El
Copy link
Author

Be-El commented Apr 25, 2023

Hi,

the helm chart requires certain secrets to be present. These are generated by cockroachdb. In a postgresql setup there is no cockroackdb, thus no secrets. This prevents the pods from starting since the secret cannot be mapped.

If I use empty fake secrets, the init container fails since it tries to copy //* to some destination. This fails if the secret is empty and no files are present.

@Be-El
Copy link
Author

Be-El commented Apr 25, 2023

An addition:

I can use fake secret content since the it is not used in the actual database setup in case of postgresql. Deployment fails nonetheless since the zitadel init code requires administrative access to the postgresql database. Since we have a shared postgreql cluster, we cannot use administrative credentials in third party applications. I've already created an issue in the zitadel core project, since code change will be required to solve this problem.

@vavsab
Copy link

vavsab commented May 5, 2023

Do I understand you correctly that you would like to have the secret data keys configurable for these secrets?

Other connection secrets like username, password, host etc are configurable in the ZITADEL yaml as described here. For secret ZITADEL config, you can use the secretConfig property in the Helm values.

while we are here, I'm concerned that these secrets only set Cockroach env vars but do not set POSTGRES variables.

@eliobischof
Copy link
Member

@Be-El, @vavsab I created a user story in #91 that should address your issues. Please track and participate in #91.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants