You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
jeromy-cannon opened this issue
Feb 26, 2024
· 0 comments
Assignees
Labels
BugA error that causes the feature to behave differently than what was expected based on design docsP3Low priority issue. Will not impact the release schedule if not complete.
solo network destroy runs a helm uninstall therefore leaving behind PVCs and secrets. We have already added an flag for deleting the PVCs (--delete-pvcs).
After the network nodes are up and running, then solo account init will update the account public keys and generate the Kubernetes secrets.
Here we want to add a flag to delete the Kubernetes secrets within the same namespace, eg: --delete-secrets
SOLO_CLUSTER_NAME=solo-e2e
SOLO_NAMESPACE=solo-e2e
SOLO_CLUSTER_SETUP_NAMESPACE=solo-e2e-cluster
kind delete cluster -n "${SOLO_CLUSTER_NAME}"
kind create cluster -n "${SOLO_CLUSTER_NAME}"
solo init --namespace "${SOLO_NAMESPACE}" -i node0,node1,node2 -t v0.47.0 -s "${SOLO_CLUSTER_SETUP_NAMESPACE}"
solo node keys --gossip-keys --tls-keys --key-format pem
solo cluster setup
solo network deploy
solo node setup
solo node start
solo account init
The text was updated successfully, but these errors were encountered:
jeromy-cannon
added
P3
Low priority issue. Will not impact the release schedule if not complete.
Bug
A error that causes the feature to behave differently than what was expected based on design docs
labels
Feb 26, 2024
BugA error that causes the feature to behave differently than what was expected based on design docsP3Low priority issue. Will not impact the release schedule if not complete.
solo network destroy
runs ahelm uninstall
therefore leaving behind PVCs and secrets. We have already added an flag for deleting the PVCs (--delete-pvcs
).After the network nodes are up and running, then
solo account init
will update the account public keys and generate the Kubernetes secrets.Here we want to add a flag to delete the Kubernetes secrets within the same namespace, eg:
--delete-secrets
The text was updated successfully, but these errors were encountered: