Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,12 @@ data:
resource-type:
resource: pods
version: v1
- kind: "k8s-dynamic"
name: "k8s/namespaces"
config:
resource-type:
resource: namespaces
version: v1
Copy link
Member

@wallrj wallrj Nov 8, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For the other resource types there is a corresponding RBAC ClusterRole and ClusterRoleBinding which explicitly grants permission to the the agent service account to read those resources.

Do service accounts implicitly have permission to list namespaces?

The RBAC ClusterRole was also omitted in #507

# gather services for pod readiness probe rules
- kind: "k8s-dynamic"
name: "k8s/services"
Expand Down