-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hardcoded credential when using AerospikeBackup CR #318
Comments
Hi @mano1233, We are going to document the above use case. I will let you know as soon as we have a doc. |
Thanks. Please let me know once the relevant documentation is available |
Hey, In the reference about the IRSA example there is no field where you point to the relevant service account. |
Thanks for the references. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
When going over the aerospikebackup CR example. We are looking for a reference as to how we can inject the aerospike credential using a Kubernetes secret. The example has only hardcoded values -
aerospike-kubernetes-operator/config/samples/aerospikebackup.yaml
Line 17 in aa051f7
In addition, when viewing the AerospikeBackupService CR, the example only shows how to add static AWS credentials and not how to use a Kubernetes service account connected to the AWS IAM role, as instructed by our security team.
aerospike-kubernetes-operator/config/samples/aerospikebackupservice.yaml
Lines 29 to 34 in aa051f7
Please advise on how to use the CR securely, In alignment with our internal requirements.
The text was updated successfully, but these errors were encountered: