Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Why does operator need cluster-wide permissions (using clusterrolebinding instead of rolebinding)? #994

Closed
wei-tu opened this issue Aug 24, 2022 · 2 comments

Comments

@wei-tu
Copy link

wei-tu commented Aug 24, 2022

The helm chart of Clickhouse operator requires k8s cluster-wide permissions (ClusterRole / ClusterRoleBinding).

Out of security concern, our cluster only grants limited permission to services. So we would like to know:

  • 1, why it needs cluster-wide permission
  • 2, if we can move the operator from clusterrolebinding to rolebinding

We tried to hack the manifest of helm template by replacing clusterrole/clusterrolebinding with role/rolebinding and it seems still working.

@alex-zaitsev
Copy link
Member

@wei-tu , what helm chart you are referring to? We do not supply a standard helm chart.

@Slach
Copy link
Collaborator

Slach commented Aug 25, 2022

@wei-tu by default, clickhouse-operator deployment installed to kube-system namespace. It means clickhouse-operator will watch all ClickHouseInstallation resources in all namespaces and need access to all namespaces to create statefulset / pvc / service resources.
If you install operator into one namespace you don't need ClusterRole and ClusterRolebinding

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants