cyberark / conjur-authn-k8s-client

Authentication sidecar for Conjur Kubernetes integration.
https://www.conjur.org
Apache License 2.0
12 stars 14 forks source link

[Pitch to Production] Sidecar retrieves secrets and provides them to application #23

Open micahlee opened 5 years ago

micahlee commented 5 years ago

POC Branches

Acceptance Criteria

Open Questions

Open Questions

Follow Up Work

Ideas for follow on improvement work are:

micahlee commented 5 years ago

From @shaharglazner regarding:

Can you place a quota constraint on a memory volumes in k8s?

Individual secrets are limited to 1MiB in size. This is to discourage creation of very large secrets which would exhaust apiserver and kubelet memory. However, creation of many smaller secrets could also exhaust memory. More comprehensive limits on memory usage due to secrets is a planned feature.

(From: https://kubernetes.io/docs/concepts/configuration/secret/)

micahlee commented 5 years ago

From @shaharglazner regarding:

Can we encrypt the secrets at rest (a shared key between the sidecar and the app)

https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/

jodyhuntatx commented 5 years ago

Risk of storing storing secrets in K8s secrets manager

  • Encryption of etcd is the responsibility of the K8s cluster operator.
  • Sidecar will attempt to delete secrets when the pod stops, but is not guaranteed.

This is how most k8s developers would prefer we provide secrets to them. It would make the product easier to use - something it could definitely benefit from. :) However it goes against good security hygiene as mapping secrets to container env vars exposes them as plain text in tools like Weave Scope. If this route is taken, healthy caveats/warnings/disclaimers must be included.

It would be most awesome if there were a way to poke secrets into shell environment variables, as Aqua does.

izgeri commented 5 years ago

Roping in @doodlesbykumbi and @sgnn7. Since Secretless imports these libraries and we don't sufficiently test that use case here, I'd like to make sure any changes related to this issue are on the radar of the Secretless team.