Enable Workload Identity Support for Falco k8saudit-aks Plugin
Motivation
Currently, the Falco k8saudit-aks plugin requires connection strings to authenticate with Azure resources, which introduces security risks and management overhead. This feature request proposes adding support for Azure Workload Identity, which provides a more secure, manageable, and cloud-native approach to authentication.
Feature
Enhance the Falco k8saudit-aks plugin to support Azure Workload Identity for authentication instead of relying solely on connection strings.
Alternatives
Additional context
This would require setting the following params instead of existing connection string attributes.
EventHubNamespace string `json:"event_hub_namespace" jsonschema:"title=event_hub_namespace,description=The name of the EventHub namespace to read from"`
BlobStorageAccountName string `json:"blob_storage_account_name" jsonschema:"title=blob_storage_account_name,description=The name of the Blob Storage account to use as checkpoint store"`
Hi,
I also need this functionality for environments that pay attention to security and identity management issues. It doesn't seem difficult to implement. Microsoft provides this functionality in its SDK. It's just a matter of changing the auth logic in your plugin.
Propably instead of using the NewConsumerClientFromConnectionString() method, you should use NewConsumerClient(), and for its configuration, retrieve the appropriate environment variables.
I also think that this is a necessary change, and I am waiting for the implementation.
I made a similar change to my fork here. I will probably create a proposal and share soon for the same
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close.
Provide feedback via https://github.com/falcosecurity/community.
/lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
If this issue is safe to close now please do so with /close.
Provide feedback via https://github.com/falcosecurity/community.
/lifecycle rotten
Rotten issues close after 30d of inactivity.
Reopen the issue with /reopen.
Mark the issue as fresh with /remove-lifecycle rotten.
Provide feedback via https://github.com/falcosecurity/community. /close
@poiana: Closing this issue.
In response to this:
Rotten issues close after 30d of inactivity.
Reopen the issue with
/reopen.Mark the issue as fresh with
/remove-lifecycle rotten.Provide feedback via https://github.com/falcosecurity/community. /close
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.