Potential vulnerable RBAC rules in keda-operator
Clusterrolebinding
#4991
Unanswered
IsuruBoyagane15
asked this question in
Q&A / Need Help
Replies: 2 comments
-
Related: #4730 |
Beta Was this translation helpful? Give feedback.
0 replies
-
Answered? https://keda.sh/docs/2.15/operate/cluster/#restrict-secret-access |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi,
I have been using KEDA for a while and hope to use it in our production cluster.
I came across these RBAC permission rules which are not very clear to me. It would be great if someone can explain the purpose and the usage of these rules.
Keda-operator clusterRole have the following rule.
"keda-operator" and "keda-operator-metrics-apiserver" deployments which have this role, can
get, list, watch
all the cluster-widesecrets
. How can this permission be used in the "keda-operator" and "keda-operator-metrics-apiserver"? Isn't this a possibility to compromise all thesecretes
in the cluster?Is
external
a specific resources type? What is the usage ofexternal
resource in this context?Also, "keda-operator" and "keda-operator-metrics-apiserver" are given the role
system:auth-delegator
usingkeda-operator-system-auth-delegator
ClusterRoleBinding. What would be the usage ofkeda-operator
andkeda-operator-metrics-apiserver
to havesystem:
level ClusterRole?It would be great if someone can explain these with reasons.
Thanks is advance.
Beta Was this translation helpful? Give feedback.
All reactions