Skip to content

Commit f63eba6

Browse files
committed
Merge pull request kubernetes#12061 from pmorie/secrets-ug-vectors
Add information about protections/risks to secrets user guide
2 parents 785ccf4 + 429e9bd commit f63eba6

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

docs/user-guide/secrets.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -504,6 +504,9 @@ On most Kubernetes-project-maintained distributions, communication between user
504504
to the apiserver, and from apiserver to the kubelets, is protected by SSL/TLS.
505505
Secrets are protected when transmitted over these channels.
506506

507+
Secret data on nodes is stored in tmpfs volumes and thus does not come to rest
508+
on the node.
509+
507510
There may be secrets for several pods on the same node. However, only the
508511
secrets that a pod requests are potentially visible within its containers.
509512
Therefore, one Pod does not have access to the secrets of another pod.
@@ -515,12 +518,16 @@ Pod level](#use-case-two-containers).
515518

516519
### Risks
517520

521+
- In the API server secret data is stored as plaintext in etcd; therefore:
522+
- Administrators should limit access to etcd to admin users
523+
- Secret data in the API server is at rest on the disk that etcd uses; admins may want to wipe/shred disks
524+
used by etcd when no longer in use
518525
- Applications still need to protect the value of secret after reading it from the volume,
519526
such as not accidentally logging it or transmitting it to an untrusted party.
520527
- A user who can create a pod that uses a secret can also see the value of that secret. Even
521528
if apiserver policy does not allow that user to read the secret object, the user could
522529
run a pod which exposes the secret.
523-
If multiple replicas of etcd are run, then the secrets will be shared between them.
530+
- If multiple replicas of etcd are run, then the secrets will be shared between them.
524531
By default, etcd does not secure peer-to-peer communication with SSL/TLS, though this can be configured.
525532
- It is not possible currently to control which users of a Kubernetes cluster can
526533
access a secret. Support for this is planned.

0 commit comments

Comments
 (0)