Skip to content
This repository has been archived by the owner on Jan 6, 2020. It is now read-only.

Latest commit

 

History

History
35 lines (28 loc) · 1.39 KB

secure-deployment.md

File metadata and controls

35 lines (28 loc) · 1.39 KB

Secure deployment of kube-cert-manager using RBAC

Most default kubernetes installs have authorization set to 'AlwaysAllow'. This means the 'default' Service Account provided to every container you deploy has 'root' level access to the whole cluster. Containers can enter any other container, including priviledged containers, do and delete anything across the entire cluster.

Using an authorization plug-in is prudent. RBAC allow you to manage role-based access as kubernetes resources.

The rbac-example.yaml file contains Service Account and a Cluster Role to allow kube-cert-manager to manage certificates across the whole cluster

To use this you first need RBAC enabled for your cluster.

You might also need some base RBAC roles installed so your cluster can operate. Then create the Service Account and roles in the rbac-example.yaml file:

kubectl create -f rbac-example.yaml

Then add to a spec.template.spec.serviceAccount to the deployment:

serviceAccount: kube-cert-manager

and deploy the kube-cert-manager as normal. Check the kube-cert-manager logs for any permission errors:

kubectl logs <pod-name> --container kube-cert-manager

If you are deploying to a different namespace that 'default', change the namespaces in rbac-example.yaml and in deployment.yaml.