Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Separation of service accounts for Velero deployment and node-agent #606

Open
ugur99 opened this issue Jul 22, 2024 · 0 comments
Open

Separation of service accounts for Velero deployment and node-agent #606

ugur99 opened this issue Jul 22, 2024 · 0 comments
Labels

Comments

@ugur99
Copy link
Contributor

ugur99 commented Jul 22, 2024

Describe the problem/challenge you have
Currently, both the Velero deployment and the node-agent in the Helm chart share the same ServiceAccount, which grants extensive permissions nearly equivalent to cluster-admin. While Velero likely requires these permissions for its backup and restore operations, the node-agent might not need such a wide range of permissions

Describe the solution you'd like
To improve security and adhere to the principle of least privilege, it would be beneficial to evaluate the specific permissions required by each component and create separate ServiceAccounts with appropriate, fine-grained permissions.

@jenting jenting added the velero label Jul 24, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants