RBAC for tapping #8442
Replies: 2 comments 6 replies
-
I think there are a few issues here.
As far as I understand, this shouldn't require tap.
What did you do, specifically?
What command generated this output?
No, you shouldn't need secret access to use Tap. https://linkerd.io/2.11/tasks/securing-your-cluster/ includes details on configuring Tap RBAC. |
Beta Was this translation helpful? Give feedback.
-
@danibaeyens Thanks for this. The grants you used worked for me, but each user could then see all linkerd resources (routes, edges, stats, etc.) from all namespaces, not just their own. Is that your experience as well? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I'm (yeah, still) using linkerd 2.10 and I run a multi-tenant cluster with RBAC for different users (each user has their own namespace).
One of them has set up a service profile for an ExternalName service and docs say:
I've tried to grant them permissions for running a linkerd viz routes command but they seem to need:
I don't see anywhere in the docs which specific permissions I need to grant... is this one really required?
Is this, maybe, RBAC documented anywhere?
The references I find related to
linkerd-linkerd-viz-tap-admin
does not seem to grantget/list/watch
forsecrets
, i.e.:linkerd2/viz/cmd/testdata/install_prometheus_disabled.golden
Line 67 in 7ac79b8
It looks like it's needed to extend the permissions even further.
So basically, is there any doc? What are the needed permissions and the reason for granting so much for tapping? (up to secrets in linkerd-viz namespace)
Beta Was this translation helpful? Give feedback.
All reactions