-
Story
-
Resolution: Done
-
Undefined
-
None
-
None
-
None
Automatically create role for prometheus developer perspective
kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: name: metrics namespace: netobserv rules: - verbs: - create apiGroups: - metrics.k8s.io resources: - pods
As suggested by Joel, we could reuse `netobserv-reader` ClusterRole. Then we'll only need to run
oc adm policy add-role-to-user netobserv-reader user1 -n namespaceA
to allow user1 to access namespaceA metrics
- duplicates
-
NETOBSERV-1856 Add metrics reading permission to netobserv-reader role
- Closed
- links to