You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 26, 2022. It is now read-only.
I have multiple deployments of the kubernetes-external-secrets in difference namespaces on the same cluster
My expectation is they would be totally isolated but I noticed a deployment in one namespace was accessing a diff namespace
For example I saw this in the deployment in namespace-X spinning up poller {"id":"mysecret_1234","namespace":"namespace-Z","secretDescriptors":[{"backendType":"secretsManager","data":[{"key":"mykey","name":"mykey"}],"name":"mysecret"}],"ownerReference":{"apiVersion":"kubernetes-client.io/v1","controller":true,"kind":"ExternalSecret","name":"mykey","uid":"......"}}
How is this happening?
I guess im unsure of two things: how does it have access to other namespaces and how is it finding secrets in other namespaces?
Im using the helm chart to deploy and looks like its use ClusterRole. Is fixing this as easy as changing that to just Role? or maybe there is a config option to only look for secrets in the namespace where it was deployed?
The text was updated successfully, but these errors were encountered:
I have multiple deployments of the kubernetes-external-secrets in difference namespaces on the same cluster
My expectation is they would be totally isolated but I noticed a deployment in one namespace was accessing a diff namespace
For example I saw this in the deployment in namespace-X
spinning up poller {"id":"mysecret_1234","namespace":"namespace-Z","secretDescriptors":[{"backendType":"secretsManager","data":[{"key":"mykey","name":"mykey"}],"name":"mysecret"}],"ownerReference":{"apiVersion":"kubernetes-client.io/v1","controller":true,"kind":"ExternalSecret","name":"mykey","uid":"......"}}
How is this happening?
I guess im unsure of two things: how does it have access to other namespaces and how is it finding secrets in other namespaces?
Im using the helm chart to deploy and looks like its use ClusterRole. Is fixing this as easy as changing that to just Role? or maybe there is a config option to only look for secrets in the namespace where it was deployed?
The text was updated successfully, but these errors were encountered: