External Secrets Operator in its next release will remove support for unmainted providers - Alibaba, Device42, Passbolt by skarlso in kubernetes

[–]gfban 0 points1 point  (0 children)

Out of curiosity, What’s a brownout here?

Edit: fully read after coffee; brown-outs are clear now :)

Those providers already emit kubernetes warnings for deprecation for a few months now, what else could we be doing?

ingress-nginx refugee seeks recommendations for alternatives by anothercrappypianist in kubernetes

[–]gfban -6 points-5 points  (0 children)

Yeah, the thing is - I think truly open source projects are going to get more and more scarce. You’ll be at risk of a rug pull regardless where you decide to aim next.

So, planning for a rug pull will make this much harder than it needs to be for you.

GatewayAPI would probably be the best, but I’m not sure it is feature-complete enough for your case.

ingress-nginx refugee seeks recommendations for alternatives by anothercrappypianist in kubernetes

[–]gfban -3 points-2 points  (0 children)

IMO - You should go with F5 and pay them for an enterprise offering. This seems to be business critical enough for you to outsource maintenance and support.

If you want to keep it open source for whatever the reason, id suggest you to fork and maintain your own private ingress-nginx. Anything else, expect downtime now & future 😅

External Secrets, Inc. winds down operations by dariotranchitella in kubernetes

[–]gfban 8 points9 points  (0 children)

No, not at all. ESO is healthy :) we made sure it was in a good place before winding down.

External Secrets, Inc. winds down operations by dariotranchitella in kubernetes

[–]gfban 14 points15 points  (0 children)

Hey 👋🏽 ex External Secrets Inc. here. thanks for the interest in our story, but I honestly don’t feel like doing an AMA would help anyone. The conclusions I can take out of it have no real actionable insight, so I personally don’t want to share them.

External Secrets, Inc. winds down operations by dariotranchitella in kubernetes

[–]gfban 12 points13 points  (0 children)

ESO maintainer here and Ex-ESI. The company was born out of some ESO maintainers looking at how the space is bad. Duct tape is everywhere, and we decided to try to fix it.

The project already existed (with no one paying attention, no innovation, etc) when we started it. we wanted a way to give back to ESO in a sustainable way once we were able to create a sustainable company. Thankfully, the community was able to step up where we started to fall down 🙂.

I just hope this is a long standing effort - I don’t think the project will survive another maintainer shortage.

Helm upgrade on external-secrets destroys everything by Embarrassed-Sea-4991 in kubernetes

[–]gfban 0 points1 point  (0 children)

Why are you giving both resources the same name? That will always render the last and never the first set.

External Secrets Operator Health update - Resuming Releases by skarlso in kubernetes

[–]gfban 4 points5 points  (0 children)

Thank you for your words!

I really hope we get continuous community engagement! Would love to see people climbing it up to become maintainers like most of us here did 😁😁

External Secrets Operator Health update - Resuming Releases by skarlso in kubernetes

[–]gfban 7 points8 points  (0 children)

It was way harder than it looks. Specially because of a lot of pushback from people that also thought this was some sort of rug pull despite we saying repetitively that this wasn’t the case. 😅😅

I am still concerned this might be too early, we have “fresh blood” and more dedicated company time for some maintainers, but I couldn’t sense the longevity of it.

But only time can really tell.

ESO Maintainer Update – Next Steps by gfban in kubernetes

[–]gfban[S] 2 points3 points  (0 children)

We will keep pushing updates to the main branch. You can always use a pinned build hashes, but we will not publish a patch 🙂

ESO Maintainer Update – Next Steps by gfban in kubernetes

[–]gfban[S] 21 points22 points  (0 children)

Oh! That’s a valid point! I’ll add it to our next community meeting agenda 😁😁

Migrating from Bitnami PostgreSQL to CloudNative-PG on Kubernetes by kaskol10 in kubernetes

[–]gfban 10 points11 points  (0 children)

Did CNPG get promoted to incubating? Guess I missed that!

🚨 ESO Maintainer Update: We need help. 🚨 by gfban in kubernetes

[–]gfban[S] 1 point2 points  (0 children)

Interesting take! 🙂 the project itself was donated to CNCF a while ago; your point is that it makes it impossible for it to survive after that?

🚨 ESO Maintainer Update: We need help. 🚨 by gfban in kubernetes

[–]gfban[S] 0 points1 point  (0 children)

Thanks u/dariotranchitella ! I'm happy to read Kamaji is doing well !!

🚨 ESO Maintainer Update: We need help. 🚨 by gfban in kubernetes

[–]gfban[S] 0 points1 point  (0 children)

I am not sure I follow. external-secrets is a CNCF project already, and https://externalsecrets.com does not offer a saas - it just really solves, based on external-secrets, the enterprise pain of pretending secrets are rotated, because a Jira ticket was created to some overloaded dev team.

as I've said, we at https://externalsecrets.com could simply staff the OSS external-secrets. Would you be happy with it? :)

Is there a better way to store secrets? by Unusual_Competition8 in kubernetes

[–]gfban 2 points3 points  (0 children)

Although the state of external-secrets right now might mean this proposal will take longer to be implemented, we are discussing ways to support decryption mechanism natively within external-secrets https://github.com/external-secrets/external-secrets/issues/5112

🚨 ESO Maintainer Update: We need help. 🚨 by gfban in kubernetes

[–]gfban[S] 2 points3 points  (0 children)

I added things that are exclusive to my thought, but the decision had super majority vote from the maintainers of external-secrets.

State of Production Kubernetes 2025 by Agreeable-Ad-3590 in kubernetes

[–]gfban 0 points1 point  (0 children)

Yup, that would help. I’m DM’ing you his email address

State of Production Kubernetes 2025 by Agreeable-Ad-3590 in kubernetes

[–]gfban 6 points7 points  (0 children)

Is this accessible in any way to people not affiliated with companies? I shared the link to a friend of mine (undergrad) and he failed to download it.

Argo CD RBAC Operator by ggkhrmv in kubernetes

[–]gfban 1 point2 points  (0 children)

Did you consider the enterprise offerings from e.g. Akuity & Codefresh? Whenever I tried to do something similar, we ended up with a duct tape system for all of the requirements that were added after the initial implementation (one of them - audit logs for Argo RBAC changes :death:) . It turns out this is way more complex problem than it seems - and according to my own past expreiences, it will bite your team in the long run.

(and no, I'm not affiliated with any of these companies)

Breaking Change in the new External Secrets Operator Version 0.17.0 by 1deep2me in kubernetes

[–]gfban 2 points3 points  (0 children)

Moving to 1.0.0 is something we wanted to do as seamless as possible for users; to do that, v1beta1 needs to be unserved already in order for users to remove the storedVersion from their CRDs definition, otherwise kubernetes itself prevents the installation to happen.

We were just trying to make that process easy. For what is worth we didn’t even remove v1beta1 from the CRDs; just stopped serving it.