-
Notifications
You must be signed in to change notification settings - Fork 695
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot list secrets in namespace when created using kubeseal #1384
Comments
Thanks for the reply @tewfik-ghariani . The issue is that I am able to create sealed secrets but when I do, it does not create regular ones and the above output was in the controller logs. Nevertheless I will install the controller using the option that you suggested |
Hi @AhaanShetty Installing the Sealed Secrets controller in a restricted environment can be challenging sometimes. The problem, as you can see in the controller logs, the problem is that you don´t have permission to list Also, you should define the namespaces where the controller must work using the --additional-namespaces flag. |
This Issue has been automatically marked as "stale" because it has not had recent activity (for 15 days). It will be closed if no further activity occurs. Thanks for the feedback. |
Due to the lack of activity in the last 7 days since it was marked as "stale", we proceed to close this Issue. Do not hesitate to reopen it later if necessary. |
Which component:
The name (and version) of the affected component (controller or kubeseal)
Controller
kubeseal version 0.24.3
Describe the bug
I created a sealed secret using the kubeseal command and have the necessary controller and other components successfully installed using a helm chart. Now when I run "kubectl get sealedsecrets", it shows the secret I just created but upon running "kubectl get secrets", it doesn't show up under there. I thought that as soon as a sealed secret is deployed, a regular secret and a sealed secret should be created. The logs from the controller are in the output section of this issue.
I have deployed kubeseal in the cluster in my namespace and using the restrictive encviornment instructions. I set the serviceaccount to one that is enabled for our namespace but seems like the undelying container is calling the cluster wide scope even though it has been deployed to only our namespace.
Our cluster admins do not allow crossing the namespace boundary. The code is written to list secrets at the cluster scope even though I am deploying using the restricted environment instructions. The service account also has the correct verbs in the cluster role API groups for the secrets-unsealer container. Kindly help with the same
To Reproduce
Steps to reproduce the behavior:
Expected behavior
The newly created secret using kubeseal should show up under sealedsecrets and secrets CRD but only the sealedsecrets CRD can be listed. The controller is unable to unseal the secret into the regular type
Version of Kubernetes:
kubectl version
:Helm Chart
Additional context
Add any other context about the problem here.
The text was updated successfully, but these errors were encountered: