Skip to content
This repository has been archived by the owner on Jan 19, 2024. It is now read-only.

Use k8s ServiceAccount with a restricted set of permissions instead of default #19

Open
agrimmer opened this issue Jun 12, 2020 · 0 comments

Comments

@agrimmer
Copy link
Contributor

Currently, the service uses the default Service Account with a set of high privileges inside the k8s clusters.

Use a dedicated service account with a minimum set of privileges as described in our contributing guidelines here keptn-sandbox/contributing#2

Definition of Done:

  • Service either uses the keptn-default Service Account which has no privileges at all or a new, dedicated Service Account with a minimal set of permissions
# for free to subscribe to this conversation on GitHub. Already have an account? #.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant