Skip to content

fix: Add RBAC permission to patch events #660

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

sbernauer
Copy link
Member

@sbernauer sbernauer commented Jul 17, 2025

Needed since stackabletech/operator-rs#938

Not 100% sure why the product needs this, but it was this way before.

@sbernauer sbernauer enabled auto-merge July 17, 2025 12:02
@sbernauer sbernauer moved this to Development: Waiting for Review in Stackable Engineering Jul 17, 2025
@sbernauer sbernauer self-assigned this Jul 17, 2025
@sbernauer sbernauer disabled auto-merge July 17, 2025 12:05
@@ -38,6 +38,9 @@
- The default Kubernetes cluster domain name is now fetched from the kubelet API unless explicitly configured.
- This requires operators to have the RBAC permission to get nodes/proxy in the apiGroup "". The helm-chart takes care of this.
- The CLI argument `--kubernetes-node-name` or env variable `KUBERNETES_NODE_NAME` needs to be set. The helm-chart takes care of this.
- The operator helm-chart now grants RBAC `patch` permissions on `events.k8s.io/events`.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this should mention why.

"...because our operators now support deduplicating similar events" (or whatever the explanation is)

And I think we can remove the "future" statement.

Copy link
Member Author

@sbernauer sbernauer Jul 21, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Something like this?

"We think products should normally not generate events, but in case they are, there is a good chance that they not only create them, but also patch them to aggregate errors (error happened 10 times over the last 5 minutes)"

This raises the question: Why don't you check this individually for every product? And the honest answer is: We don't want to right before a release. This is the reason I added the future hint

Copy link
Member Author

@sbernauer sbernauer Jul 21, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm also happy to not explain all this and only use

The operator helm-chart now grants RBAC patch permissions on events.k8s.io/events.
This applies to the operator and the product ClusterRole

And call it a day

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Development: Waiting for Review
Development

Successfully merging this pull request may close these issues.

2 participants