Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Restrict Cluster Role access authorizations #10669

Closed
orltom opened this issue Jul 19, 2024 · 1 comment
Closed

Restrict Cluster Role access authorizations #10669

orltom opened this issue Jul 19, 2024 · 1 comment
Labels
bug Something isn't working

Comments

@orltom
Copy link

orltom commented Jul 19, 2024

Context
Our current setup utilizes the OpenTelemetry Operator for application tracing. This operator is deployed through a Helm Chart. However, the Trivy scanner identifies that the operator has broad permissions via the Kubernetes ClusterRole.

Issue
Based on my understanding, the OpenTelemetry Operator's current permissions allow it to delete various Kubernetes resources like pods, services, and service accounts. This level of access seems unnecessary for the operator's intended functionality.

The RBAC are generated via go maker comments. The most relevant ones are on the OpenTelemetryCollectorReconciler struct in the Reconcile function.

Suggestion
For more granular access, define for each required Kubernetes kind access via +kubebuilder:rbac and do not group them in a comment marker.

Hint
As these are cluster roles, this applies to all namespaces.

Version
Helm Chart v0.58.2

@orltom orltom added the bug Something isn't working label Jul 19, 2024
@orltom
Copy link
Author

orltom commented Jul 22, 2024

I accidentally submitted the issue in the wrong Opentelemetry repository. For this reason, I am closing this issue and create a new issue: open-telemetry/opentelemetry-operator#3156

@orltom orltom closed this as completed Jul 22, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant