Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SalesForce case] 698331 Need Product feedback on proposed UX for OpenShift #22

Closed
garkler-zz opened this issue May 29, 2019 · 1 comment

Comments

@garkler-zz
Copy link

garkler-zz commented May 29, 2019

Salesforce case https://cyberark.my.salesforce.com/5002J00001F0WID

From the customer

We’d like help from Cyberark addressing the “cons” in the last email around logging and permissions:

It turns out an init container can create secrets that are referenced by the second container, before they are created.

Assuming there’s some way to retrieve all secrets from Conjur for a given app, we could run a 2nd init container after the 1st Conjur init container which gets the Conjur key. This 2nd init container could get all the secrets from Conjur and create Openshift secrets for each of them. The app team wouldn’t have to change their code or container – they’d just add the 2 init containers to their deployment config.

Cons:

  1. there is no way to see the logs from an init container in the Logs tab. Might be difficult to debug it.
  2. We’d have to give the ‘default’ service identity permissions to list, view, create, and maybe delete secrets. This is because there is no way to run an init container as a different service account from the main container.

App team’s deployment config (in actuality, there’d be another init container for Conjur):

image001.png

When the real app container runs, it has the secret:

image002.png

I gave up trying to create the secrets inside the init container using the oc command line. I had to use the REST API directly and used the Java client.

@jvanderhoof
Copy link

jvanderhoof commented May 29, 2019

My TL;DR: "Conjur secrets can be resolved directly into OCP/K8s secrets." I'd like to see us put a Feature Spec together for this effort.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

No branches or pull requests

2 participants