Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kubernetes provider needs not to require cluster-admin role #330

Open
grafanalf opened this issue Jan 22, 2025 · 2 comments
Open

Kubernetes provider needs not to require cluster-admin role #330

grafanalf opened this issue Jan 22, 2025 · 2 comments
Labels
enhancement New feature or request

Comments

@grafanalf
Copy link

What problem are you facing?

As per the documentation, and based on my own experience running it in production, it is complicated to infer what permissions to grant to the provider-kubernetes Service Account other than the cluster-admin. Running as cluster-admin is seen as a risk by our security team.

How could Crossplane help solve your problem?

It would be highly appreciated if, as part of the provider documentation, or as part of the integration with Crossplane's RBAC, the Kubernetes provider can describe the least permissions to be ran use, other than user cluster-admin.

@grafanalf grafanalf added the enhancement New feature or request label Jan 22, 2025
@phisco
Copy link
Collaborator

phisco commented Jan 22, 2025

I don't think there is a way to do this, you'd have to predict the future and know what resources you'll wrap in Objects either directly or through Compositions

@grafanalf
Copy link
Author

The problem is that when using watches (Alpha at the moment), I can't seem to get the correct RBAC policy to have my Object resources properly watch the underlying Kubernetes resources. Instead, propagation of status from the real Kubernetes resource into atProvider takes the reconciliation time (10 minutes).

Using cluster-admin works fine, though.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants