-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using existing secret #136
Comments
okay.. i figure out the problem. The documentation isn't correct. It took the
|
Hello @Arvindh-Mojo, glad to hear you were able to debug the issue yourself! If you don't mind my asking, what command are you using to install the Helm charts? Are you embedding the charts into another chart? Are you using something like ArgoCD to deploy? From reading your comment, it seems like you're embedding the |
Hey @cirego thanks for reaching out. Actually, i'm using my setup is that, secrets are in aws secrets manager and i'm using the right now. my setup looks like this values.yaml
chart.yaml
in my local charts/template im creating two crds - for a service account and do you have any documentation around this i can reference ? |
Hi @Arvindh-Mojo, the documentation that you linked is our existing documentation on how to use existing secrets with Kubernetes. This is also how our internal tests are configured to verify that this functionality works. One thing you might consider would be having two charts: one that creates the existing secret and service account and then use the stock lacework agent charts with references to those resources. Also, to confirm, if you run |
Yes, followed that documentation to configure stuffs but i guess my problem is with the
The secrets store csi driver communicates with the provider using gPRC to retrieve the secret content from the external secret store using In a nutshell, i need the daemon set to come up properly. For a classic case where, i already have a k8s secret it would work but not in this case. something is off with the |
@Arvindh-Mojo, did you leave the |
@cirego i left the values.yaml
however, in the your
any suggestion of how to go about it. because i need to add
|
@cirego Chris - we need to have some sort of way to enable/disabled the default |
basically, these charts are incompatible when using an external secret store(in my case aws csi driver for secret store) which uses i made a local copy of your chart and modified the |
Hi @Arvindh-Mojo, if you can raise a support ticket, we can prioritize making some changes to the Helm Charts to make this work with |
@cirego thanks !! will do and I will probably do a PR. In order to have this work, all we need to have is the ability to mount additional volumes to the |
I'm currently seeing a similar issue. I'm using ArgoCD to deploy lacework agents using Helm Charts and I don't see a way to use kubernetes secrets to retrieve the accessToken. I've tried setting I would think that would require a way to create a service account with similar permissions as well to access the kubernetes secrets too. Any guidance on this or suggestions on current workarounds? |
After playing around with this a bit further, I think the issue comes down to how secrets are being retrieved in the ConfigMap. I've set
|
Hi - can you provide some guidance on this ? I'm trying to install the lacework agent using helm chart and use existing secret.
it works when i put the access token value in the values.yaml file but i dont want to expose the secret in helm but have it pull from
AWS secrets manager
. I have configured the secret-csi-driver
andsecret-store
. I also haveSecretProviderClass
which will create and mount the kubernetes secret for lacework agent.I'm following this documentation --> https://docs.lacework.com/onboarding/deploy-on-kubernetes#specify-an-existing-secret
The secret should be created with name LaceworkAcessToken in the EKS cluster.
my
values.yaml
however i end up getting the below error
can you let me know about this issue ?
The text was updated successfully, but these errors were encountered: