-
Notifications
You must be signed in to change notification settings - Fork 189
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] Operator takes ownership of adminCredentialsSecret that wasn't created by it #763
Comments
[Triage] Hey @L1ghtman2k I have tested the creation of admin secret
After I delete the cluster by deleting the config file ( Adding @bbarani @salyh @jochenkressin @pchmielnik @swoehrl-mw |
It might be related to me also setting opensearch securityConfigSecret(I also set the password hash)? |
It should not as well, I have once tested the |
Kubectl apply (not helm) |
Then same as me, so can you try once clean up in your dev and test with the configuration (secret and cluster config yaml) I have provided above ? |
What is the bug?
An operator takes ownership of the secret that wasn't created by it. As a result, the operator deletes the secret, when the cluster is deleted, even though the operator wasn't supposed to manage said resource.
What is the expected behavior?
The secret that was created by a different processor other than operator should remain
The text was updated successfully, but these errors were encountered: