-
Bug
-
Resolution: Unresolved
-
Undefined
-
None
-
4.21
-
None
-
None
-
False
-
-
None
-
Moderate
-
None
-
None
-
None
-
None
-
In Progress
-
Release Note Not Required
-
NA
-
None
-
None
-
None
-
None
This is a clone of issue OCPBUGS-74200. The following is the description of the original issue:
—
Description of problem:
The openshift-monitoring/prometheus-k8s service account has cluster-wide permissions to get/list/watch endpointslice resources.
Version-Release number of selected component (if applicable): 4.21
How reproducible:
always
Steps to Reproduce:
1. Check RBAC permissions for the prometheus-k8s service account
2.
3.
Actual results:
Permissions to get/list/watch endpointslice resources for all namespaces.
Expected results:
Permissions to get/list/watch endpointslice resources only for namespaces which contain ServiceMonitor resources using the new endpointslice service discovery role.
Additional info:
To align with the current security model for the legacy endpoints resources.
- clones
-
OCPBUGS-74200 RBAC permissions for the prometheus-k8s service account are not restrictive enough for endpointslice resources
-
- ON_QA
-
- is blocked by
-
OCPBUGS-74200 RBAC permissions for the prometheus-k8s service account are not restrictive enough for endpointslice resources
-
- ON_QA
-
- links to