You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*Note:* Ensure your service account secret (sa.json) is created in the namespace linked to the issuer so the webhook can access the project resources.
98
+
*Note on service accounts and namespaces:*
99
+
- Issuer-per-namespace (recommended forisolation): create a STACKIT service-account key (sa.json) for each STACKIT project you need to manage and place that keyin a Kubernetes Secret in the same namespace as the Issuer. This means one sa.json (one SA key) per Issuer/namespace when the Issuers target different STACKIT projects.
100
+
Example (create a secret in the Issuer namespace):
Ensure the webhook can read the secret in that namespace (create the secret where the Issuer lives).
107
+
- Alternative (single SA key for multiple projects): you can grant the service account broader permissions at folder or organization level so one sa.json can manage zones across multiple projects. This is more convenient but grants wider access — evaluate security and follow least-privilege principles.
108
+
- Tradeoffs:
109
+
- Per-namespace/per-project SA keys: better isolation and least privilege, easier to rotate keys per project.
110
+
- Folder/org-level SA key: lower operational overhead (single key), but larger blast radius if compromised.
99
111
100
112
3. ***Demonstration of Ingress Integration with Wildcard SSL/TLS Certificate Generation***
101
113
Given the preceding configuration, it is possible to exploit the capabilities of the Issuer or ClusterIssuer to
0 commit comments