We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Describe your question/ Hi, I'm using ArgoCD with Helm to deploy Authentik to my k8s cluster.
ArgoCD
Helm
Relevant info Kube version: v1.28.8+k3s1 ArgoCD: 2.10.6 Authentik Helm Chart Version: 2024.2.2
v1.28.8+k3s1
2.10.6
2024.2.2
Screenshots If applicable, add screenshots to help explain your problem.
Logs
{"event": "PostgreSQL connection failed, retrying... (connection failed: FATAL: password authentication failed for user \"authentik\")", "level": "info", "logger": "authentik.lib.config", "timestamp": 1713241332.2785354} {"event": "PostgreSQL connection failed, retrying... (connection failed: FATAL: password authentication failed for user \"authentik\")", "level": "info", "logger": "authentik.lib.config", "timestamp": 1713241333.3092413} {"event": "PostgreSQL connection failed, retrying... (connection failed: FATAL: password authentication failed for user \"authentik\")", "level": "info", "logger": "authentik.lib.config", "timestamp": 1713241334.339394} {"event": "PostgreSQL connection failed, retrying... (connection failed: FATAL: password authentication failed for user \"authentik\")", "level": "info", "logger": "authentik.lib.config", "timestamp": 1713241335.3650475}
Version and Deployment (please complete the following information):
Additional context Chart.yaml
Chart.yaml
apiVersion: argoproj.io/v1alpha1 kind: Application metadata: name: authentik namespace: argocd spec: destination: namespace: authentik name: enterprise project: default sources: # Chart from Chart Repo - chart: authentik repoURL: https://charts.goauthentik.io targetRevision: 2024.2.2 helm: valueFiles: - $values/enterprise/authentik/values.yaml - $values/enterprise/authentik/sealed-secrets.yaml # Values from Git - repoURL: 'https://git.enterprise.com/enterprise/argocd' targetRevision: HEAD ref: values syncPolicy: automated: prune: true selfHeal: true syncOptions: - CreateNamespace=true
values.yaml
global: addPrometheusAnnotations: true env: - name: AUTHENTIK_POSTGRESQL__HOST value: "postgresql.postgresql.svc.cluster.local" - name: AUTHENTIK_POSTGRESQL__NAME value: "authentik" - name: AUTHENTIK_POSTGRESQL__USER value: "authentik" - name: AUTHENTIK_POSTGRESQL__PORT value: "5432" - name: AUTHENTIK_POSTGRESQL__PASSWORD valueFrom: secretKeyRef: name: authentik-secret key: postgres-password - name: AUTHENTIK_REDIS__HOST value: redis-master.redis.svc.cluster.local - name: AUTHENTIK_REDIS__PORT value: "6379" - name: AUTHENTIK_REDIS__PASSWORD valueFrom: secretKeyRef: name: authentik-secret key: redis-password - name: AUTHENTIK_SECRET_KEY valueFrom: secretKeyRef: name: authentik-secret key: authentik-secret authentik: log_level: debug error_reporting: enabled: false env: - name: AUTHENTIK_POSTGRESQL__HOST value: "postgresql.postgresql.svc.cluster.local" - name: AUTHENTIK_POSTGRESQL__NAME value: "authentika" - name: AUTHENTIK_POSTGRESQL__USER value: "authentik" - name: AUTHENTIK_POSTGRESQL__PORT value: "5432" - name: AUTHENTIK_POSTGRESQL__PASSWORD valueFrom: secretKeyRef: name: authentik-secret key: postgres-password - name: AUTHENTIK_REDIS__HOST value: redis-master.redis.svc.cluster.local - name: AUTHENTIK_REDIS__PORT value: "6379" - name: AUTHENTIK_REDIS__PASSWORD valueFrom: secretKeyRef: name: authentik-secret key: redis-password - name: AUTHENTIK_SECRET_KEY valueFrom: secretKeyRef: name: authentik-secret key: authentik-secret worker: env: - name: AUTHENTIK_POSTGRESQL__HOST value: "postgresql.postgresql.svc.cluster.local" - name: AUTHENTIK_POSTGRESQL__NAME value: "authentika" - name: AUTHENTIK_POSTGRESQL__USER value: "authentik" - name: AUTHENTIK_POSTGRESQL__PORT value: "5432" - name: AUTHENTIK_POSTGRESQL__PASSWORD valueFrom: secretKeyRef: name: authentik-secret key: postgres-password - name: AUTHENTIK_REDIS__HOST value: redis-master.redis.svc.cluster.local - name: AUTHENTIK_REDIS__PORT value: "6379" - name: AUTHENTIK_REDIS__PASSWORD valueFrom: secretKeyRef: name: authentik-secret key: redis-password - name: AUTHENTIK_SECRET_KEY valueFrom: secretKeyRef: name: authentik-secret key: authentik-secret server: service: type: LoadBalancer metrics: enabled: true
I'm not sure what I'm missing but the server fails to spin up claiming that the postgres cannot be reached correctly.
postgres
I've verified that the password is correct, my strong guess is that the env variables are not honoured.
env
Thank you.
The text was updated successfully, but these errors were encountered:
you can run ak dump_config in the container to see what config authentik interpreted
ak dump_config
Sorry, something went wrong.
No branches or pull requests
Describe your question/
Hi, I'm using
ArgoCD
withHelm
to deploy Authentik to my k8s cluster.Relevant info
Kube version:
v1.28.8+k3s1
ArgoCD:
2.10.6
Authentik Helm Chart Version:
2024.2.2
Screenshots
If applicable, add screenshots to help explain your problem.
Logs
Version and Deployment (please complete the following information):
Additional context
Chart.yaml
values.yaml
I'm not sure what I'm missing but the server fails to spin up claiming that the
postgres
cannot be reached correctly.I've verified that the password is correct, my strong guess is that the
env
variables are not honoured.Thank you.
The text was updated successfully, but these errors were encountered: