-
Bug
-
Resolution: Cannot Reproduce
-
Normal
-
None
-
1.5.6
Syncing the following resource:
apiVersion: external-secrets.io/v1alpha1 kind: ExternalSecret metadata: name: fluent-bit-audit namespace: fluent-bit labels: app.kubernetes.io/name: fluent-bit-audit spec: refreshInterval: 1h secretStoreRef: name: ocpapp-cluster-secret-store kind: ClusterSecretStore target: name: fluent-bit-audit creationPolicy: Owner template: metadata: labels: app.kubernetes.io/name: fluent-bit-audit type: Opaque data: fluent-bit.conf: |- [SERVICE] Daemon Off Flush 5 Log_Level info Parsers_File parsers.conf Parsers_File custom_parsers.conf HTTP_Server On HTTP_Listen 0.0.0.0 HTTP_Port 2020 Health_Check On [INPUT] Name forward Listen 0.0.0.0 Port 24224 Buffer_Chunk_Size 1M Buffer_Max_Size 30M [OUTPUT] Name azure Match * Customer_ID {{ .LAWS_WSID | toString }} Shared_Key {{ .LAWS_KEY | toString }} Log_Type ocp_audit Retry_Limit 3 [OUTPUT] name splunk match * host {{ .SPLUNK_HOST | toString }} port 8088 event_index apigateway_test_openshiftaudit splunk_token {{ .SPLUNK_KEY | toString }} tls on tls.verify off Retry_Limit 3 [OUTPUT] name azure_blob match linux-audit* account_name {{ .LOG_RETN_BLOB_NAME | toString }} shared_key {{ .LOG_RETN_BLOB_KEY | toString }} blob_type blockblob path ocp-audit/linux-audit container_name ocp-audit tls on Retry_Limit 3 [OUTPUT] name azure_blob match k8s-audit* account_name {{ .LOG_RETN_BLOB_NAME | toString }} shared_key {{ .LOG_RETN_BLOB_KEY | toString }} blob_type blockblob path ocp-audit/k8s-audit container_name ocp-audit tls on Retry_Limit 3 [OUTPUT] name azure_blob match openshift-audit* account_name {{ .LOG_RETN_BLOB_NAME | toString }} shared_key {{ .LOG_RETN_BLOB_KEY | toString }} blob_type blockblob path ocp-audit/openshift-audit container_name ocp-audit tls on Retry_Limit 3 [OUTPUT] name azure_blob match kubernetes* account_name {{ .LOG_RETN_BLOB_NAME | toString }} shared_key {{ .LOG_RETN_BLOB_KEY | toString }} blob_type blockblob path ocp-audit/application-audit container_name ocp-audit tls on Retry_Limit 3 data: - secretKey: LAWS_WSID remoteRef: key: log-analytics-workspace-id-dc1 - secretKey: LAWS_KEY remoteRef: key: log-analytics-workspace-key-dc1 - secretKey: SPLUNK_HOST remoteRef: key: splunk-host-dc1 - secretKey: SPLUNK_KEY remoteRef: key: splunk-key-dc1 - secretKey: LOG_RETN_BLOB_NAME remoteRef: key: log-retn-blob-name-dc1 - secretKey: LOG_RETN_BLOB_KEY remoteRef: key: log-retn-blob-key-dc1
Utilizing External Secrets in strategy to access secrets from Azure Key Vault.
In ExternalSecrets, there is a resource `.spec.refreshInterval`. This value is default set at 1h. Our CRDs Also set this at 1h. The issue is that it is being parsed to `1h0m0s`. As such this is causing ArgoCD (OpenShift GitOps) to flag it as 'out of sync'.
Tried the workaround mentioned in the ticket GITOPS-2211 but it didn't work.
It is noted that External Secrets does have its own webhook that notices the same issue when deploying a CRD which is `apiVersion: external-secrets.io/v1alpha1`. As the external secrets operator converts to `apiVersion: external-secrets.io/v1beta1`.
However instead of ArgoCD noticing the live manifest of `apiVersion: external-secrets.io/v1beta1` it ignores the managedFields update which progresses from `apiVersion: external-secrets.io/v1alpha1` to `apiVersion: external-secrets.io/v1beta1`.
Even if the live manifest is physically updated to the repository format ArgoCD does not observe the change.
Business Impact:
DevOps support team is being distracted by out of sync flags for applications that are in-sync.
- is documented by
-
RHDEVDOCS-5215 GitOps 1.9 release notes
- Closed
- is related to
-
GITOPS-2211 DeploymentConfig is OutOfSync most of the time
- Closed
- relates to
-
GITOPS-2673 Argo CD Application controller is stuck Syncing applications
- Closed