Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hardcoded credential when using AerospikeBackup CR #318

Open
mano1233 opened this issue Oct 15, 2024 · 5 comments
Open

Hardcoded credential when using AerospikeBackup CR #318

mano1233 opened this issue Oct 15, 2024 · 5 comments

Comments

@mano1233
Copy link

When going over the aerospikebackup CR example. We are looking for a reference as to how we can inject the aerospike credential using a Kubernetes secret. The example has only hardcoded values -

In addition, when viewing the AerospikeBackupService CR, the example only shows how to add static AWS credentials and not how to use a Kubernetes service account connected to the AWS IAM role, as instructed by our security team.

secrets:
- secretName: aws-secret
volumeMount:
name: aws-secret
mountPath: /root/.aws/credentials
subPath: credentials

Please advise on how to use the CR securely, In alignment with our internal requirements.

@sud82
Copy link
Collaborator

sud82 commented Oct 16, 2024

Hi @mano1233, We are going to document the above use case. I will let you know as soon as we have a doc.

@mano1233
Copy link
Author

Thanks. Please let me know once the relevant documentation is available

@abhishekdwivedi3060
Copy link
Collaborator

Hi @mano1233, the doc is available here
It has examples for both of your use-cases.

@mano1233
Copy link
Author

Hey, In the reference about the IRSA example there is no field where you point to the relevant service account.

@abhishekdwivedi3060
Copy link
Collaborator

Hi, service account is not part of the CR. It is expected to be created manually with a specific name before deploying the Backup service.
See this to create service account.
See this to configure IRSA for the service account.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants