You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When adding connection pooler in the Postgresql CR then the pgbouncer deployment/pods do not get the imagePullSecrets specified in the Helm chart. The pgbouncer pod is using service account "default" and not the account specified in "pod_service_account_name".
Thereby it is not possible to run the connection pooler using a private container registry.
I suggest that the specified service account "pod_service_account_name" is used for the pgbouncer deployment like it is done for the postgresql statefulset. Thereby the imagePullSecrets defined in "pod_service_account_definition" will be used for the pgbouncer as well.
Alternative is to expand the connection pooler configuration with imagePullSecrets options, however, that would just make the usage more complex.
I recommend to reuse the existing service account created for the database pods.
General information:
We are running operator registry.opensource.zalan.do/acid/postgres-operator:v1.8.0 at Kubernetes on-premises
The text was updated successfully, but these errors were encountered:
Feature:
When adding connection pooler in the Postgresql CR then the pgbouncer deployment/pods do not get the imagePullSecrets specified in the Helm chart. The pgbouncer pod is using service account "default" and not the account specified in "pod_service_account_name".
Thereby it is not possible to run the connection pooler using a private container registry.
I suggest that the specified service account "pod_service_account_name" is used for the pgbouncer deployment like it is done for the postgresql statefulset. Thereby the imagePullSecrets defined in "pod_service_account_definition" will be used for the pgbouncer as well.
Alternative is to expand the connection pooler configuration with imagePullSecrets options, however, that would just make the usage more complex.
I recommend to reuse the existing service account created for the database pods.
General information:
We are running operator registry.opensource.zalan.do/acid/postgres-operator:v1.8.0 at Kubernetes on-premises
The text was updated successfully, but these errors were encountered: