-
**Requester:** Nikhil Kathole
**Issue:** Support for cleaning up more resources on AWS like policies, roles, s3 buckets for AWS from multiple accounts.
**Urgency:** Whenever we can, the existing…
-
The upstream kbs deployment recipes lack explicit state management and store resources like secrets, policies on a local container instance. There are APIs that allow altering of that pod-local state,…
-
I do have a GitHub repository for a Mozilla Firefox add-on (WebExtension). It does have changelog data listed in the repository in the following structure (see live in https://github.com/rugk/mastodon…
rugk updated
7 months ago
-
### Description
In an IAC world, it is likely that terraform, system users with public/private key credential are set up and the private key is placed in a named, say, an Azure KeyVault (as a secret)…
-
**What is the feature request? What problem does it solve?**
Currently, administrators of VDK Control Service configure data jobs using either:
* a configuration type of plugin of VDK SDK
* …
-
### What happened?
The Target group looks like it successfully creates, but then an error message causes the entire up to fail, because it seems like it cannot read the resources state
```
error:…
-
We see couple of challenges with the current model.
- The users namespace may span multiple clusters and identity management systems.
- The container and host namespaces are decoupled of one ano…
-
# Proposal
It would be nice to have a separate key "variables" to fetch **TF_VAR_** either inline using **env:** for via **envFrom:**. There exists already a similar options for secrets, the "credent…
-
1. utilizar bcrypt para passwords
2. servidores em utc
3. https only
4. application errors envio para meu email ou algum tracker
5. alertar alguem quando o servico nao tiver rodando
6. load balancing
…
-
Using this action, I noticed that environment variables from github secrets are not passed to the server, so they can be used in docker-compose.yml. Or am I mistaken?