Add GKE workload identity federation as credentials for fetching secrets #12433
mhouthuijzen1977
started this conversation in
Ideas
Replies: 1 comment 2 replies
-
We support creating GCP Secrets Manager https://apisix.apache.org/docs/apisix/terminology/secret/#use-gcp-secrets-manager-to-manage-secrets, does this feature meet your needs? |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
We are running Apisix workloads in a GKE cluster. We want to provision secrets in GCP Secret Manager which can be fetched by the Service Account credentials mounted in the Apisix gateway pod through Workload Identity Federation mechanism of GKE.
We don't want to provision Service Account credentials (private keys) through YAML config or the Admin API because handling and downloading the SA key files is a security vulnerability and is a pattern that is discouraged by GCP themself.
Is this something that you see as a future enhancement? Or is this a no-go?
Greetz Maikel
Beta Was this translation helpful? Give feedback.
All reactions