Replies: 1 comment
-
|
hi @earayu Authentication data (username/password) and connection configuration (host/port/database) should be managed separately.
Besides Connection information like host and port should be dynamically provisioned via Kubernetes Services, not hardcoded or duplicated into Secrets. For instance, applications and databases are usually deployed in differnent K8s clusters. and database usually exposes its svc through LB. Such info are not told while provisioning database clusters. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Summary
Currently, when KubeBlocks creates database accounts, the generated secrets only contain
usernameandpasswordfields. It would be helpful to also include connection details likehost,port, anddatabasename in the same secret.Current Behavior
The account secrets generated by KubeBlocks currently look like this:
Proposed Enhancement
Include additional connection parameters in the secret:
Benefits
Use Case
When deploying applications that need to connect to KubeBlocks-managed databases, developers currently need to:
With this enhancement, all connection details would be available in one place.
Questions/Considerations
I'm not entirely sure if this is the best approach, so I'd love to hear the community's thoughts on this proposal.
Beta Was this translation helpful? Give feedback.
All reactions