Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ensure privileged deployment mode works #77

Closed
elevran opened this issue Oct 10, 2023 · 1 comment
Closed

Ensure privileged deployment mode works #77

elevran opened this issue Oct 10, 2023 · 1 comment
Labels
enhancement New feature or request management plane

Comments

@elevran
Copy link
Collaborator

elevran commented Oct 10, 2023

There are two modes which would like ClusterLink to support:

  • running in a separate (and privileged) namespace, thus limiting access to administrators; and
  • running control and data planes in user namespace (unprivileged deployment)

We need to validate the first use case and ensure that (initial list, more items might be discovered):

  • control and data plane run in a dedicated (e.g., clusterlink-system) namespace
  • control plane has sufficient (but not too wide) RBAC privileges to (e.g.,) create Services in other namespace, watch Pods in other namespace (for policy attribute determination), etc.

This should likely be related to a more k8s native management (e.g., using CRDs) where per namespace configuration is also possible via (e.g., Export/Import) CRDs. Doing so using the CLI makes separating developer and administrator privileges difficult (e.g., granular roles encoded and managed via CLI token, etc.)
See #28 for CRD discussion

@elevran elevran added enhancement New feature or request management plane labels Oct 10, 2023
@elevran elevran changed the title Ensure privileged deployment works and is allocated correct RBAC Ensure privileged deployment mode works Oct 10, 2023
@elevran
Copy link
Collaborator Author

elevran commented Mar 18, 2024

Covered by its milestone's tasks. Closing in favor of the individual issues

@elevran elevran closed this as completed Mar 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request management plane
Projects
None yet
Development

No branches or pull requests

1 participant