Deploying Operator with customized/restricted RBAC #12150
Replies: 1 comment 2 replies
-
|
The operator creates the roles in some cases in order to provide minimal required access for the operands where required. In theory, you could precreate the roles with the right names to avoid the operator needing the CREATE RBAC. But you cannot block it from managing the roles. The (Frankly, not wanting to give the operator access to the namespaced RBAC resources is highly unusual - I think you are the first one. Usually if there is something what needs to be created out-of-band, it is only the cluster-scoped RBAC resources. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi there,
I am evaluating using this operator in an environment where I can't actually deploy RBAC resources. RBAC must be deployed separately from the helm chart, so I've set
rbac.create: no, and I've compiled all of the permissions here.However I am seeing errors in the operator logs for reading and creating roles. Is there a way to create all of the expected roles separately and not have the operator manage any RBAC? (I understand the simplicity/value in having the operator do this, however in this environment it's simply not possible)
Beta Was this translation helpful? Give feedback.
All reactions