-
Couldn't load subscription status.
- Fork 72
[Feature] Enable ML Operator and add required Platform Roles #1952
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR enables the ML (Machine Learning) operator in ArangoDB Kubernetes deployments and adds the required RBAC permissions for the platform operator to manage ML-related resources.
- Enables the ML operator by setting
ml: truein values.yaml files - Adds comprehensive RBAC permissions for managing Kubernetes resources needed by ML workloads
- Updates changelog to document the feature addition
Reviewed Changes
Copilot reviewed 7 out of 7 changed files in this pull request and generated 4 comments.
Show a summary per file
| File | Description |
|---|---|
| chart/kube-arangodb-enterprise/values.yaml | Enables ML operator by changing ml flag from false to true |
| chart/kube-arangodb-enterprise-arm64/values.yaml | Enables ML operator by changing ml flag from false to true |
| chart/kube-arangodb/templates/platform-operator/role.yaml | Adds RBAC permissions for RBAC, batch, apps, and core API resources |
| chart/kube-arangodb-enterprise/templates/platform-operator/role.yaml | Adds RBAC permissions for RBAC, batch, apps, and core API resources |
| chart/kube-arangodb-enterprise-arm64/templates/platform-operator/role.yaml | Adds RBAC permissions for RBAC, batch, apps, and core API resources |
| chart/kube-arangodb-arm64/templates/platform-operator/role.yaml | Adds RBAC permissions for RBAC, batch, apps, and core API resources |
| CHANGELOG.md | Documents the feature addition |
| resources: | ||
| - "roles" | ||
| - "rolebindings" | ||
| verbs: [ "*" ] |
Copilot
AI
Aug 11, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Granting wildcard permissions () for RBAC resources (roles and rolebindings) poses a significant security risk as it allows the operator to escalate privileges. Consider using specific verbs like ["get", "list", "create", "update", "patch", "delete"] instead of "".
| verbs: [ "*" ] | |
| verbs: [ "get", "list", "create", "update", "patch", "delete" ] |
| resources: | ||
| - "cronjobs" | ||
| - "jobs" | ||
| verbs: [ "*" ] |
Copilot
AI
Aug 11, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Using wildcard permissions (*) for batch resources is overly permissive. Consider limiting to specific operations needed for ML workloads like ["get", "list", "create", "update", "patch", "delete", "watch"].
| verbs: [ "*" ] | |
| verbs: [ "get", "list", "create", "update", "patch", "delete", "watch" ] |
| - apiGroups: [ "apps" ] | ||
| resources: | ||
| - "statefulsets" | ||
| verbs: [ "*" ] |
Copilot
AI
Aug 11, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Wildcard permissions (*) for StatefulSets should be restricted to only the necessary operations. Consider using specific verbs like ["get", "list", "create", "update", "patch", "delete", "watch"].
| verbs: [ "*" ] | |
| verbs: [ "get", "list", "create", "update", "patch", "delete", "watch" ] |
| - "secrets" | ||
| - "services" | ||
| - "serviceaccounts" | ||
| verbs: [ "*" ] |
Copilot
AI
Aug 11, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Granting wildcard permissions (*) for core resources including secrets is a security concern as it provides excessive access to sensitive data. Consider limiting to specific operations required for ML functionality.
| verbs: [ "*" ] | |
| verbs: | |
| - "get" | |
| - "list" | |
| - "watch" |
No description provided.