-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add account to storage & node-agent #324
Conversation
Signed-off-by: Amir Malka <amirm@armosec.io>
PR Analysis
PR Feedback
How to use
|
Signed-off-by: Amir Malka <amirm@armosec.io>
Signed-off-by: Amir Malka <amirm@armosec.io>
Signed-off-by: Amir Malka <amirm@armosec.io>
PR Type:
Enhancement
PR Description:
This PR enhances the security of the Kubescape Operator by loading the account from a secret instead of a config map in the storage and node-agent components. The changes include:
PR Main Files Walkthrough:
files:
charts/kubescape-operator/templates/node-agent/daemonset.yaml
: A new volume for the secret has been added to the node-agent daemonset. This volume is then mounted to the pod at '/etc/credentials'. The secret is named according to the value of 'global.cloudSecret' from the values file.charts/kubescape-operator/templates/storage/deployment.yaml
: The account ID is now being set from the values file in the storage deployment. A new environment variable 'ACCOUNT_ID' has been added for this purpose.User Description:
Overview
Account was loaded from config map instead of secret in the storage and node-agent components.
Not in this PR - new versions of storage & node-agent
Related PRs: