Uploaded image for project: 'Network Observability'
  1. Network Observability
  2. NETOBSERV-1857

Facilitate prometheus role creation for developers

    • Icon: Story Story
    • Resolution: Done
    • Icon: Undefined Undefined
    • None
    • None
    • Prometheus
    • None
    • NetObserv - Sprint 259

      Automatically create role for prometheus developer perspective

      kind: Role
      apiVersion: rbac.authorization.k8s.io/v1
      metadata:
        name: metrics
        namespace: netobserv
      rules:
        - verbs:
            - create
          apiGroups:
            - metrics.k8s.io
          resources:
            - pods 

       

      As suggested by Joel, we could reuse `netobserv-reader` ClusterRole. Then we'll only need to run 

      oc adm policy add-role-to-user netobserv-reader user1 -n namespaceA 

      to allow user1 to access namespaceA metrics

              jpinsonn@redhat.com Julien Pinsonneau
              jpinsonn@redhat.com Julien Pinsonneau
              Amogh Rameshappa Devapura Amogh Rameshappa Devapura
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: