Hello. Excited to get this working.
one connect pods are green. I've created my CRD for a OnePasswordItem. I've applied it. I see the CRD in the Object Explorer on GKE. However, my actual k8s secret never shows up. I guess I was expecting a log or message or error of some sort to tell me what to do next.
Here's my vault:
Here's my OnePasswordItem in the Object Explorer:
Here's my yaml for the OnePasswordItem above:
How do I troubleshoot? Is there a log file that tells me what I'm missing?
Thanks!
1Password Version: Not Provided
Extension Version: Not Provided
OS Version: Not Provided
Comments
Team Member
Hey!
I am glad to hear you are excited to get this to work. Speaking from my own experience, it's pretty magical when it works!
Let's try to get this sorted. First a quick check because it is not explicitly mentioned in the post: you are running the 1Password Operator? (either by manually deploying the manifest in that repo or through our Helm chart)
If that is indeed the case, could you share the logs of the
onepassword-connect-operator
deployment? (kubectl logs deployment/onepassword-connect-operator
probably does the trick) That might contains some hints as to what is going on.Joris
Thanks for the quick reply. I did forget to mention that! Yes, installed the helm version as part of the install. I have a deployment called onepassword-connect. Inside are a couple of containers:
Both are running, green and have 0 restarts.
I restarted the pod for fresh logs. Heres the dump of both the connect-api and connect-sync logs
kubectl logs deployment/onepassword-connect -c connect-api
kubectl logs deployment/onepassword-connect -c connect-sync
Team Member
Thank you for clarifying that! I think I know what the issue could be.
The magic that automatically creates Kubernetes secrets is not included in the base setup of Connect. That requires running a separate operator that talks with the Kubernetes API.
Fortunately, that is all included in the Helm chart. So enabling it should be as simple as running the following Helm command:
The operator requires a Connect token (with read access to all vaults that it should create secrets for) to communicate with Connect. That can be stored in a k8s secret, like this:
If all goes well, you should end up with an extra
onepassword-connect-operator
deployment.Let me know if that helps.
Joris
Silly me. That did it. Yes, it's magical. Excellent help, thank you!
Team Member
You're welcome. Glad it works now. Enjoy the magic!