Skip to content

Add Support for API Server Sidecar Containers in Karmada Operator #6096

Closed
@jabellard

Description

@jabellard

What would you like to be added:
Encryption of confidential data at rest in Kubernetes is very crucial for ensuring a strong security posture. To enable that, Kubernetes supports a few options for configuring encryption at rest. Given that using a KMS-based encryption provider ensures a very robust security posture as compared to the other options, it's a great choice in an environment where integration with such a system is possible. When using a KMS-based provider, a KMS plugin is required to enable the integration. For instance, this is the plugin to bridge the integration for the AWS KMS offering. Once set up, the API server communicates to the plugin over a UNIX domain socket using gRPC. For that to work, when the API server is deployed as a pod as is the case when provisioned by the Karmada operator, the plugin has to run as a sidecar of the API server container.

Why is this needed:
At Bloomberg, we're currently building a managed Karmada platform and want to use the Karmada operator to manage the entire lifecycle of managed Karmada instances. One of our core requirements is to configure encryption at rest for managed Karmada control planes. Do do so, we want to integrate with our internal KMS as that will ensure a very strong security posture that adheres to our operational standards.

Activity

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/featureCategorizes issue or PR as related to a new feature.

    Type

    No type

    Projects

    • Status

      No status

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions