-
Notifications
You must be signed in to change notification settings - Fork 221
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: add configurable automountServiceAccountToken #620
fix: add configurable automountServiceAccountToken #620
Conversation
c365338
to
8aaed9c
Compare
Hello, |
Hi there @JorTurFer , The change keeps the It makes it configurable though for cases such as with Azure AKS Security policy which scans for any pod/deployments/SA that have it set to A similar thread on this from For example in KEDAs cases this would be done as follows:
This same volume workflow is explained to be done by K8s ServiceAccount admission controller too when setting Hope this makes more sense on why it is helpful to make it configurable 😄 |
0c8fc72
to
5b2f372
Compare
@JorTurFer @tomkerkhove PTAL 👋 |
Signed-off-by: Stefan Caraiman <[email protected]>
5b2f372
to
7a1453e
Compare
I think that you should expect the rule directly in the Azure Security Center rather than "hacking" the rule. @tomkerkhove ? |
No harm in setting explicit definitions though, at least imo it seems more of a hack that the internal K8s admission controller does the volume mount of the tokens without the user being aware of it. Nevertheless will leave it up to you to decide 👍 |
I'm not directly against this tbh, but I'd like to see other folks thoughts. |
@JorTurFer i will go ahead and close this PR in favour of #625 thanks |
This PR makes
automountServiceAccountToken
configurable for the deployment definitions.Checklist
Fixes #
automountServiceAccountToken
option in pod definitions