-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Access control for berglas-secrets-webhook available? #38
Comments
I've resolved by myself. It is yet beta feature, but I could remove public access referring this.
|
I could remove public access, but I could not figure out which permission I should allow from GKE master node. I am not attaching (although should attach) a service account to GKE cluster, so google compute engine default service account should be attached at GKE cluster, but
did not work. |
Where |
Yes, it is what I tried. |
Hi @sonots And you're sure your cluster is using the default compute service account and not a custom one? If so, I"m not entirely sure. I just tested this on a new cluster with the default service account and invoker permissions and it's working. |
I am pretty sure I am using the default one. |
kubectl describe pod shows that
It worked well before modifying permissions #37
|
If you know how to debug |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
I followed https://github.com/GoogleCloudPlatform/berglas/tree/master/examples/kubernetes to setup berglas for my k8s cluster, and it seems working fine.
Now, I am thinking about access control for berglas-secrets-webhook. In my understanding, cloudfunction is public. Do you have any plans to support access control or do you think there is no risk even if it is public or do you already have any access controls?
The text was updated successfully, but these errors were encountered: