When we create an Elasticsearch resource, the credentials for the "elastic" user are created and stored in the kubernetes secrets, with the name "-es-elastic-user"
Is it safe to delete this k8s secret? Does the system have any dependency on this secret?
What about the other secrets like ca-certs, internal-users, etc?
My goal is to use a different secret store (Azure Keyvault) to store the secrets. The Azure keyvault csi driver can be used to only read secrets and mount it as a volume to the containers, but not write secrets to keyvault by the eck operator.