-
Hi, currently we are having some trouble to get the strimzi-operator to run in our (a bit more restrictive) managed cluster. If I understand it correctly the operator is trying to create and bind roles that include the verbs: ["list", "watch", "create", "delete"] for resources like kafkatopics/status, kafkausers/status and a few others for the creation of the EntityOperator. But in our case the permissions/roles the ServiceAccount is granted are auto generated by our managed cluster. We assume by using the CLI "rbac-tool". This generated ruleset only contains ["get", "patch", "update"] for the stated resources from above (see attached command below). And therefore we are not able to grant more permissions than that from inside the running operator. So I guess the main question here is, is this full permission set including: ["list", "watch", "create", "delete"] really needed for /status /scale resources and maybe others? Or are they only part of the permission set out of convenience? Additionally it would be interesting to understand where the role the cluster-operator creates originates from. And whether it can be configured/altered in some way? Any input would be highly appreciated. The rbac-tool outputs the following example Role:
Source: https://github.com/alcideio/rbac-tool/ strimzi-cluster-operator log:
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 7 replies
-
I'm not sure I really understand which permissions it does or does not need. TBH, I cannot confirm out of my head that the But the particular error you get is I think because you badly edited the rights. You took it from the Cluster Operator, but not from the Cluster Roles it assigns to the other components. So if you are going to remove it, you should remove it from everywhere. |
Beta Was this translation helpful? Give feedback.
Hmm, you are right. I forgot about that I guess you would need to modify the resources and rebuild the operator from the sources.