Keda and Hashiorp Vault Authtication using serviceAccount as Auth method #4601
Replies: 3 comments 4 replies
-
For now i need to test i believe the nil pointer due to not providing now more question what should be the data in vault is it should be in plain text or it will be in base64 encoded inside vault, |
Beta Was this translation helpful? Give feedback.
-
I am not an expert in development, but it seems to me that we could consider working in a way similar to https://github.com/bank-vaults/vault-secrets-webhook ? There are sidecars spawned with every Pod and use the Pod service account. Or something similar, so as not to be tied to the service account of the KEDA operator. Let a small pod with the necessary service account be raised for each trigger and request secrets in the vault... |
Beta Was this translation helpful? Give feedback.
-
A better example as I said would be External Secret Operator. Just to make
sure we don't fail the pod in case the sidecar fails
…On Thu, 8 Aug, 2024, 11:22 am Aleksei Krugliak, ***@***.***> wrote:
I am not an expert in development, but it seems to me that we could
consider working in a way similar to
https://github.com/bank-vaults/vault-secrets-webhook ? There are sidecars
spawned with every Pod and use the Pod service account.
Or something similar, so as not to be tied to the service account of the
KEDA operator. Let a small pod with the necessary service account be raised
for each trigger and request secrets in the vault...
—
Reply to this email directly, view it on GitHub
<#4601 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ACIGKDGU7YWTYQBB4C4YN33ZQMBSRAVCNFSM6AAAAABMFXTU62VHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTAMRXGEZTONI>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
I am currently Testing Hashicorp Vault authentication for keda, we noticed the way keda uses is it directly uses serviceaccount token for keda for keda operator now i am getting some issues with and definitely need better examples on authentication.
I found the Architecture is quote troublesome.
Since the triggers or all the triggers will use operator service account to communicate that means we need a key than can read creds from all paths , that itself is problematic to have, and also this can not used at all in shared cluster where there are multiple project hosted since it mean violation of policy.
Suggestion would handling it how external secret operator does since its one of the standardized way to pull secret from vault.
Also we need more logs for Auth errors seems very limited.
for now im getting token not found error on my trigger,
also we are seeing this error as well for some reason.
Beta Was this translation helpful? Give feedback.
All reactions