Replies: 1 comment 2 replies
-
An operator like Strimzi needs to be able to do things such as update or delete secrets or pods. That is how it runs the Kafka clusters. I do not think these permissions are in any way special. These are the things operators do.
You should probably use the namespaces a bit better then and have for example different namespace for your Kafka and for your database etc. It might not completely solve any security concerns, but will certainly provide better isolation, make it easier to monitor and debug things etc.
That is your call during the installation. If you installed the operator to watch and manage the whole cluster, then it needs Cluster Role Bindings for all its ClusterRoles because you told it to manage Kafka clusters in all namespaces. If you install it to watch for example only its own namespace, it would install for some of the permissions (such as reading secrets) only RoleBindings for the ClusterRoles which give it access only to its own namespace. So this is something you control. Just keep in mind that Kubernetes are not really a multitenant platform and with resources such as CRDs you need to be careful about installing a separate operator into each namespace for example. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello. We recently sent our charts and images for vulnerability scan, and this is the feedback we received.
Here is the permissions associated to the SA:
An attacker can access all secrets, update secrets, delete secrets, delete pods etc. This will lead to a malicious user to access other resources or perform denial of services by deleting resources. Is there a way we can reduce the permissions while allowing operator to administrate the cluster? If all these verbs and resources are required, can we remove them using kubectl after spinning up the cluster and etc?
Can we limit the RBAC permissions to namespace level i.e., switch clusterrole to role / rolebinding? Currently the strimzi operator sits in the same namespace as all other services and we have no plan to let strimzi operator to administrate resources outside of its cluster.
Beta Was this translation helpful? Give feedback.
All reactions