Skip to content
This repository has been archived by the owner on Dec 12, 2023. It is now read-only.

Use k8s ServiceAccount with a restricted set of permissions instead of default #21

Open
agrimmer opened this issue Jun 12, 2020 · 0 comments

Comments

@agrimmer
Copy link

Currently, the service uses the default Service Account with a set of high privileges inside the k8s clusters.

Use a dedicated service account with a minimum set of privileges as described in our contributing guidelines here keptn-sandbox/contributing#2

Definition of Done:

  • Service either uses the keptn-default Service Account which has no privileges at all or a new, dedicated Service Account with a minimal set of permissions
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant