Skip to content

feat: enhance log storage configuration with existing secret support#199

Closed
avaya09 wants to merge 4 commits into
mainfrom
fix/logstore_existing_secret
Closed

feat: enhance log storage configuration with existing secret support#199
avaya09 wants to merge 4 commits into
mainfrom
fix/logstore_existing_secret

Conversation

@avaya09
Copy link
Copy Markdown
Contributor

@avaya09 avaya09 commented May 20, 2026

  • Added support for using an existing Kubernetes Secret for log storage credentials in values.yaml.
  • Updated secret management in templates to reference the new log storage secret.
  • Expanded documentation to include expected keys for various log storage backends.

- Added support for using an existing Kubernetes Secret for log storage credentials in values.yaml.
- Updated secret management in templates to reference the new log storage secret.
- Expanded documentation to include expected keys for various log storage backends.
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR adds support to the portkey-app Helm chart for sourcing log storage credentials from an existing Kubernetes Secret, instead of always templating them into the chart-managed gateway Secret.

Changes:

  • Added logStorage.existingSecretName to values.yaml to enable referencing a pre-created Secret for log storage credentials.
  • Updated templates to (a) stop rendering log storage keys into the gateway Secret when an existing Secret is configured and (b) read log storage env vars from the existing Secret via a new helper.
  • Expanded secret-manager integration docs to include example Secret sync and required key sets per log storage backend.

Reviewed changes

Copilot reviewed 4 out of 4 changed files in this pull request and generated 1 comment.

File Description
charts/portkey-app/values.yaml Adds logStorage.existingSecretName value to support referencing an existing Secret.
charts/portkey-app/templates/gateway/secrets.yaml Skips templating log storage credentials into the gateway Secret when an existing Secret is configured.
charts/portkey-app/templates/_helpers.tpl Introduces helper to resolve the secret name for log storage env vars (existing secret vs gateway secret).
charts/portkey-app/docs/secret-manager-integration.md Documents expected keys and provides an example for syncing log storage credentials into a Secret.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines 9 to 12
type: Opaque
data:
{{- if not .Values.logStorage.existingSecretName }}
{{- if .Values.logStorage.s3Compat.enabled}}
…tes Secret

- Introduced configuration options for reusing an existing Kubernetes Secret for bedrockAssumed credentials in values.yaml.
- Updated documentation to reflect the new secret management for bedrockAssumed.
- Enhanced templates to conditionally reference the existing secret for bedrockAssumed credentials.
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 4 out of 4 changed files in this pull request and generated 3 comments.

Comment thread charts/portkey-app/templates/gateway/secrets.yaml Outdated
Comment on lines 11 to 13
data:
{{- if not .Values.logStorage.existingSecretName }}
{{- if .Values.logStorage.s3Compat.enabled}}
Comment on lines +384 to +386
The `logStore` key value encodes the backend type — one of `s3_compat`,
`s3_assume`, `mongo`, or `azure`. The two overrides are independent: you can
use an existing Secret for one and let the chart manage the other.
- Modified the conditional logic in secrets.yaml to ensure proper handling of existing secrets for both log storage and bedrockAssumed credentials.
- This change enhances the flexibility of secret management in the gateway configuration.
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 5 out of 5 changed files in this pull request and generated 2 comments.


logStorage:
logStore: "s3_custom"
logStore: "s3Compat"
Comment on lines +384 to +385
The `logStore` key value encodes the backend type — one of `s3_compat`,
`s3_assume`, `mongo`, or `azure`. The two overrides are independent: you can
- Changed the logStore value from s3Compat to s3_custom in openshift.yaml to reflect the new naming convention.
- Updated documentation to clarify the available logStore options, including the addition of s3_custom.
@avaya09 avaya09 closed this May 21, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants