-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support environment variables for credentials #132
Comments
As I have the same request, maybe #151 is enough for this? |
#151 has been merged but then reverted by upstream - apparently, this is not wanted. |
ENV vars are not very secure, as they can be leaked in a number of ways. It is more recommended to read credentials from a file, as these are more easily protected from accidental exposure. The PR was reverted because it added everything as ENV vars. This is not allowed. A change that allows just the connection string as an ENV would be accepted. |
#153 would be a better solution if the issues were addressed. |
I opened #159 with the additional handling of |
Would it be possible to support environment variables for the exporter's configuration?
I intend to use this exporter with Kubernetes, right now I need to do something like this:
It is more ideal to use environment variables as they can be derived from pre configured secrets.
This way, the configuration can be safely committed to a Git repo, and the secret can be managed by existing secret management tools within the K8s ecosystem.
The text was updated successfully, but these errors were encountered: