-
Notifications
You must be signed in to change notification settings - Fork 40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] - Operator FalconNodeSensor API Secrets #471
Comments
Hello, Please use the imagePullSecrets, or if using git, it is recommended for these values to be injected by a post-merge job from CI/CD or GH/Gitlab secrets that injects the values in into the CR config and updates the deployment post-merge of a PR. Otherwise, we don't have plans to implement this since imagePullSecrets and git with CI/CD and/or GH/Gitlab secrets should be used for this. The forthcoming helm chart for the operator will also be another way to handle this as well. |
Forgive my ignorance as I'm still trying to understand the differences between using the falcon API and using an image from a registry. I would like to use the falcon api but not being able to specify a secret that stores the client_secret is a blocker. Can I use image pull secrets without specifying a custom image?
Why is recommended to not use a secret if using git? We use dozens of helm charts and a handful of operators and none of them dictate that users should not store secrets in secrets. They allow referencing native k8s secrets in CRDs and charts. |
We're using the Operator on GKE with Autopilot, which is prevent us to use Flacon image from a private repository (at least 2 weeks GKE support isn't able to add our repository the an allow-list as mentioned in the doc). So we have to use |
I found a bypass by using Kyverno. Kyverno is a configurable AdmissionController, so it will modify the fields on the fly. This is just a patch, because the usual solution is the operator to allow specifying secret refs directly. The kyverno policy required to do this is:
And this is the corresponding secret:
NOTE: Despite kyverno documentation says |
Thank you for the example @miguelcvent ! |
Overview
As a user I would like to reference a secret to provide the
falcon_api.client_id
andfalcon_api.client_secret
sensitive values to theFalconNodeSensor
object so that I can safely store it in source control.Extra Information
0.9.1
of the Operator on OpenShift.** Move CID to Secret Object falcon-helm#87
The text was updated successfully, but these errors were encountered: