-
Story
-
Resolution: Done
-
Undefined
-
None
-
None
-
None
-
None
-
False
-
-
False
-
None
-
None
-
None
-
NetObserv - Sprint 259
Automatically create role for prometheus developer perspective
kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: metrics
namespace: netobserv
rules:
- verbs:
- create
apiGroups:
- metrics.k8s.io
resources:
- pods
As suggested by Joel, we could reuse `netobserv-reader` ClusterRole. Then we'll only need to run
oc adm policy add-role-to-user netobserv-reader user1 -n namespaceA
to allow user1 to access namespaceA metrics
- duplicates
-
NETOBSERV-1856 Add metrics reading permission to netobserv-reader role
-
- Closed
-
- links to