You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/vendor/replicated-sdk-customizing.md
+120-1Lines changed: 120 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ This section describes role-based access control (RBAC) for the Replicated SDK,
10
10
11
11
### Default RBAC
12
12
13
-
The SDK creates default Role, RoleBinding, and ServiceAccount objects during installation. The default Role allows the SDK to get, list, and watch all resources in the namespace, to create Secrets, and to update the `replicated` and `replicated-instance-report` Secrets:
13
+
The SDK creates default Role, RoleBinding, and ServiceAccount objects during installation. The default Role allows the SDK to get, list, and watch all resources in the namespace, to create Secrets, and to update the `replicated`, `replicated-instance-report`, `replicated-custom-app-metrics-report`, and `replicated-meta-data` Secrets:
14
14
15
15
```yaml
16
16
apiVersion: rbac.authorization.k8s.io/v1
@@ -44,6 +44,7 @@ rules:
44
44
- replicated
45
45
- replicated-instance-report
46
46
- replicated-custom-app-metrics-report
47
+
- replicated-meta-data
47
48
```
48
49
49
50
### Minimum RBAC Requirements
@@ -269,3 +270,121 @@ This is the format produced by `kubectl create secret tls <secret_name> --cert=<
269
270
tlsCertSecretName: YOUR_TLS_SECRET
270
271
```
271
272
Where `YOUR_TLS_SECRET` is the secret in the namespace containing the TLS certificate and key.
273
+
274
+
## Minimal RBAC
275
+
276
+
With the Replicated SDK version 1.7.0 and later, you can enable the use of a less-permissive RBAC role for the SDK pod by setting the `replicated.minimalRBAC` Helm value in your Helm chart.
277
+
278
+
```yaml
279
+
# Helm chart values.yaml
280
+
281
+
replicated:
282
+
minimalRBAC: true
283
+
```
284
+
285
+
If statusInformers are not set manually, this RBAC role will include permissions to `get`, `list`, and `watch` all secrets, deployments, statefulsets, daemonsets, services, ingresses, PVCs, pods, replicasets, and endpoints within the namespace.
286
+
This allows Replicated to discover the Helm chart secret for your application, parse it to determine what resources to monitor, and then monitor those resources.
287
+
288
+
If statusInformers are set manually, then the generated role will not be created with the ability to access all secrets, and other resources will be specified by name when possible.
289
+
An example statusInformer configuration and generated role is presented below.
0 commit comments