Skip to content

Restrict Cluster Role access authorizations #3156

Open
@orltom

Description

@orltom

Component(s)

No response

Describe the issue you're reporting

Context
Our current setup uses the OpenTelemetry Operator to make the application traceable. The operator is deployed through a Helm Chart. However, our Trivy scanner identifies that the operator has broad permissions via the Kubernetes ClusterRole.

Revise
Based on my understanding, the OpenTelemetry Operator's current permissions allow it to delete various Kubernetes resources like pods, services, and service accounts. This level of access seems unnecessary for the operator's intended functionality.

The RBAC are generated via go maker comments. The most relevant ones are on the OpenTelemetryCollectorReconciler struct in the Reconcile function.

Suggestion

  • For more granular access, define for each required Kubernetes kind access via +kubebuilder:rbac and do not group them in a single go comment marker.
  • Remove delete access

Hint
As these are cluster roles, this applies to all namespaces.

Version
Helm Chart v0.58.2

Metadata

Metadata

Assignees

No one assigned

    Labels

    area:collectorIssues for deploying collectorarea:rbacIssues relating to RBAChelp wantedExtra attention is neededquestionFurther information is requested

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions