-
Task
-
Resolution: Done
-
Undefined
-
None
-
None
-
2
-
False
-
-
False
-
RHIDP-4212 - Feature parity between Helm Chart and Operator
-
-
Enhancement
-
-
-
RHDH Install 3264
From this upstream controller-runtime issue it looks like we can remove all use of kube-rbac-proxy . It is recommended to leverage the built-in WithAuthenticationAndAuthorization filter in controller-runtime: https://book.kubebuilder.io/reference/metrics#how-the-metrics-endpoint-can-be-protected-
Use of kube-rbac-proxy
- This is used to protect the metrics endpoint exposed by the operator.
Acceptance Criteria
- Remove all occurrences of the sidecar container using kube-rbac-proxy/ ose-kube-rbac-proxy images from the Operator Deployment
- Leverage the built-in WithAuthenticationAndAuthorization filter to protect the /metrics endpoint
- Regenerate the bundle manifests
- Everything works as before.
- Check if the /metrics endpoint is used (perhaps from OpenShift Monitoring) and if metrics still show up
Testing
- create a Pod that curls this endpoint
- make sure only pods with the right K8s service account role can access this endpoint
If successful, RHIDP-2830 can be closed as won't do, since this eliminates the need for the extra container in the CSV.
- blocks
-
RHIDP-2298 Consider adding health checks for operator's kube-rbac-proxy container
- Closed
- impacts account
-
RHIDP-2830 Upgrade to latest supported stream of ose-kube-rbac-proxy-rhel9 4.16
- Closed
- relates to
-
RHIDP-2830 Upgrade to latest supported stream of ose-kube-rbac-proxy-rhel9 4.16
- Closed
-
RHIDP-2298 Consider adding health checks for operator's kube-rbac-proxy container
- Closed
- links to