-
Bug
-
Resolution: Done
-
Major
-
2.7.5.GA
-
False
-
None
-
False
-
This issue is major and not critical because stork/k8s is in tech-preview
Extension Ref:
io.smallrye.stork:stork-service-discovery-kubernetes
Currently, the application that uses Stork + k8s extension requires some extra k8s privileged of a given namespace. This is required in order to do the service discovery.
kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: namespace: "${NAMESPACE}" name: endpoints-reader rules: - apiGroups: [""] # "" indicates the core API group resources: ["endpoints"] verbs: ["get", "watch", "list"]
By default an OCP user/service will not have these rights, so looks weird ( and could expose some vulnerabilities) to enable these rights to one specific user.
- relates to
-
QUARKUS-1413 Service Discovery with Stork (Technical Preview)
-
- Closed
-