You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# One of 'breaking', 'deprecation', 'new_component', 'enhancement', 'bug_fix'
2
+
change_type: breaking
3
+
4
+
# The name of the component, or a single word describing the area of concern, (e.g. operator, target allocator, github action)
5
+
component: target allocator
6
+
7
+
# A brief description of the change. Surround your text with quotes ("") if it needs to start with a backtick (`).
8
+
note: Use recommended interfaces(resource selector) by the prometheus-operator for watching CRs.
9
+
10
+
# One or more tracking issues related to the change
11
+
issues: [2309]
12
+
13
+
# (Optional) One or more lines of additional information to render under the primary note.
14
+
# These lines will be padded with 2 spaces and then inserted directly into the document.
15
+
# Use pipe (|) for multiline entries.
16
+
subtext: The target allocator now requires get/list/watch permissions for namespaces. Update your RBAC permissions for the attached role, if necessary.
Copy file name to clipboardExpand all lines: cmd/otel-allocator/README.md
+5-1
Original file line number
Diff line number
Diff line change
@@ -124,7 +124,7 @@ to collector instance pods by default.
124
124
125
125
126
126
### RBAC
127
-
The ServiceAccount that the TargetAllocator runs as, has to have access to the CRs. A role like this will provide that
127
+
The ServiceAccount that the TargetAllocator runs as, has to have access to the CRs and the namespaces to watch for the pod and service monitors. A role like this will provide that
128
128
access.
129
129
```yaml
130
130
apiVersion: rbac.authorization.k8s.io/v1
@@ -139,6 +139,10 @@ rules:
139
139
- podmonitors
140
140
verbs:
141
141
- '*'
142
+
- apiGroups: [""]
143
+
resources:
144
+
- namespaces
145
+
verbs: ["get", "list", "watch"]
142
146
```
143
147
In addition, the TargetAllocator needs the same permissions as a Prometheus instance would to find the matching targets
0 commit comments