Open BChancusi opened 1 year ago
Thanks, @BChancusi for raising these issues. Wonder if you have interest in contributing to any of the issues mentioned? We do have a monthly contributor's meeting you're welcome to join even if just to discuss.
I was looking into the k8s API token security finding myself and wondering if both containers needed access to the k8s API, or if maybe only the emissary-apiext container does. Does anyone know?
When installing Emissary on AKS with the AKS related polcies enabled, including the Azure provided policy initative "Kubernetes cluster pod security restricted standards for Linux-based workloads", pods are non-compliant:
emissary-system/emissary-apiext pod:
emissary/emissary-ingress pod:
The apiext pod should possibly have the same default security context as the main ingress pod when installed through helm. E.g. "runAsUser:8888" etc.
Credentials auto mount should be resolvable by specifying our own service account and volume through helm param but yet to try.
To Reproduce Steps to reproduce the behavior:
Versions: