Skip to content

Conversation

@anders-elastisys
Copy link
Contributor

📝 Description

Wanted to reduce the amount of RBAC permissions that are given to kube-monkey for security reasons. Currently, when RBAC is enabled through the Helm chart, kube-monkey is given permissions of the default Kubernetes ClusterRole edit which has quite extensive permissions over resources that kube-monkey does not need such as accessing secrets. Hence, this feature adds a new more restricted ClusterRole that only has the delete permission for pods, and only read permissions for Kubernetes apps (e.g. deployments).

🔗 Related Issues

The following issue is quite old but was used as a starting point for how the ClusterRole could be configured with limited permissions: #22

@worldtiki
Copy link
Collaborator

Thank you @anders-elastisys!

@worldtiki worldtiki merged commit 4c3dc92 into asobti:master Dec 19, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants