RealTheory runs as a service account in your Kubernetes cluster. By default, RealTheory has RBAC permissions for a limited set of API groups. If your environment uses non-standard API groups, Kubernetes will deny access requests from the RealTheory Collector and generate an audit event for each failed request. These events typically appear as Forbidden errors in logs and audit records and indicate that access was blocked due to insufficient permissions.
To augment the RBAC permissions within the RealTheory Collector deployment manifest for each cluster that contains non-standard API groups, you must add a ClusterRole for each API group to the ClusterRole section of the RealTheory deployment manifest.
1# The cluster role grants read only access to key API groups.
1- apiGroups: [<api group name>]2 resources: ["*"]3 verbs: [get, watch, list]
Where <api group name> is the API group that contains the resources you want RealTheory to be able to access.
kubectl apply -f <filename.yaml>On This Page
Search for a command to run...