|
|
|
@ -34,3 +34,11 @@ stateDiagram-v2
|
|
|
|
|
backup_ready --> new_password_added: restic-password !empty && restic-password-to-rotate !empty
|
|
|
|
|
new_password_added --> backup_ready: restic-password !empty && restic-password-to-rotate empty
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### First Steps
|
|
|
|
|
|
|
|
|
|
1. Cloud Testserver hochfahren
|
|
|
|
|
2. Dort backup-restore deployment (leeres Secret mgl.?), neues Secret "rotation-credential-secret" als Daten
|
|
|
|
|
3. mounten von angelegtem Secret in Pod backup-restore
|
|
|
|
|
4. ba*bash*ka Skript in pod starten -> liest Secret ?leer
|
|
|
|
|
5. Micha cons.
|