When working on software projects, there often arises a need to create additional environment variables for various purposes. One common scenario for this is when users need to securely handle sensitive information, such as passwords or API keys. By storing a user password in a secret, the system ensures that such sensitive information is not exposed to unauthorized access, and this practice offers enhanced security.
values.yaml
lensesHq:
# Additional env variables appended to deployment
# Follows the format of [EnvVar spec](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.21/#envvar-v1-core)
additionalEnv:
- name: ADMIN_USER
valueFrom:
secretKeyRef:
name: multi-credentials-secret
key: user1-username
- name: ADMIN_USER_PWD
valueFrom:
secretKeyRef:
name: multi-credentials-secret
key: user1-password
In the the past it was possible to use H2 database which would be instantly deployed and ready to use alongside the agent.
Due to certain performance limitations which come with H2 database which can impact the agent functionality, we decided to completely remove H2 support.
However, persistence parameter still remains and can be used to enable extra volume creation dedicated specifically just logs.
persistence:
log:
# -- (boolean) Extra volume creation dedicated for logs.
# @section -- Persistence scope values
enabled: true
# -- (boolean) Annotations dedicated for logs.
# @section -- Persistence scope values
annotations: {}
# -- (list) Access mode rights for created persistence volumes.
# @section -- Persistence scope values
accessModes:
- ReadWriteOnce
# -- (string) Size of persistence that will be created.
# @section -- Persistence scope values
size: 5Gi