cf-api-kpack-watcherdeployment usesadmin_client_secretnon secretcloud-controller-ng-yamlconfigmap consumes postgres passwordcloud-controller-ng-yamlis just a huge yaml dump. can this be broken down into key-value config mapcloud-controller-ng-yamlbunch of other secrets that are unused but still in the configmapcloud-controller-ng-yamlconfigmap consumes blobstore passwordcloud-controller-ng-yamlconfigmap consumes uaa password as plain textcloud_controller_username_lookup_client_secreteiriniconfig-map consumes secret nameapp-registry-credentialsas config yaml (instead of secret).- Will
kapprotate CRDs that reference secret names e.g.Gateway.istio-ingressgateway.credentialName uaa-configconfig map consumesencryption.encryption_keys.passphraseuaa-configconfig map consumes certs directlyserviceProviderKey,serviceProviderKeyPassword,serviceProviderCertificateuaa-configconfig map consumesLOGIN_SECRET: uaa-login-secretinstead of mounted pathuaa-configconfig map consumes client secrets as plain textcf-k8s-networking,cloud_controller_username_lookup,capi_kpack_watcheruaa-configconfig map consumescf_admin_passwordfrom values.yml as plain text- cf-for-k8s is using the same uaa admin passwords for components. instead, it should use separate passwords for each client.
Last active
June 11, 2020 16:42
-
-
Save Syerram/e00a2d70337b0ba7d6853c7606a2f735 to your computer and use it in GitHub Desktop.
Audit of final cf-for-k8s deployment
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment