Roles in SAAP
Depending on responsibilities of a role, specific roles can be assigned to user groups, which enable them to achieve there daily tasks. Below is a list of roles provided by SAAP for different user groups.
Namespaces are divided into two sub-categories:
- Stakater owned : created by the Stakater team which consists of projects/namespaces with format
openshift*
,stakater*
,kube*
,redhat*
,default
- Customer owned : created by the customer
SAAP Cluster Admin (sca
) role
The permissions for the SAAP Cluster Admin (sca
) role includes:
Operators Permissions
- can view OperatorHub in console
- can create/view/delete CRs for curated operators e.g.
- AMQ Certificate Manager Operator
- OpenShift Pipelines Operator
- can install cluster-wide operators from a curated list provided by the OperatorHub. This makes the operator available to all developers on your cluster to create Custom Resources and applications using that Operator.
- can view installed operators by using the web console/CLI
- can install operators in customer owned namespace
- can manage subscriptions in customer owned namespace
- can not install privileged and custom operators cluster-wide
- can view
sealedsecrets
custom resource in all namespaces
Projects Permissions
- can create/update/patch customer owned namespaces
- can create/view/edit/delete all resources in customer owned namespaces
- can only view resources in Stakater owned namespaces
- can not view
secrets
,configmaps
,jobs
andcronjobs
in Stakater owned namespaces
Storage
- can create/view/edit
persistentvolumeclaims
,storageclasses
, andvolumesnapshots
in the cluster - can not delete
persistentvolumeclaims
,storageclasses
andvolumesnapshots
in the cluster
Networking
- can create/view/delete
NetworkPolicy
objects in customer owned namespaces - can view services in all namespaces
- can view routes and ingresses in all namespaces
- can view/update DNS resources for DNS Forwarder
apigroups
in customer owned namespaces
Monitoring
- can view console dashboard where metrics are shown for namespaces
- can view customer owned namespaces status
- can view events in all namespaces
Compute
- can view machines, machinesets, nodes, machine configs, machine config pools, imagestreams
- can start
anyuid
andnonroot
SCCs - can not delete machines, machinesets, nodes, machine configs, machine config pools, imagestreams
User Management
- can view users/groups
- can view service accounts/roles/role bindings in customer owned namespaces
- can create/view on
UserIdentityMappings
- can create/verify tokens and access
- can not delete members from cluster-admin
- can create
admin
rolebinding on customer owned namespaces - can create edit rolebinding on customer owned namespaces
- can not view service accounts/roles/role bindings in Stakater owned namespaces
- can not add members to cluster-admin
Velero Backups & Restores
- can view/edit/create/delete Backup and Restores
- can view/edit/create/delete Schedules for Velero in
openshift-velero
namespace
Administration
- can create/edit/delete resource quotas and limits on the cluster
- can access the reserved
saap-cluster-admin
project on the cluster, which allows for the creation ofServiceAccounts
with elevated privileges and gives the ability to update default limits and quotas for projects on the cluster saap-cluster-admin
service account can create projectsaap-cluster-admin
service account can delete projectsaap-cluster-admin
service account cannot edit/create rolebinding- can not create/edit/delete
clusterresourcequotas
Only the mentioned permissions above are present for the role, for any other permission required the user need to raise a case with Stakater Support team.
How to request this role from Stakater Support
If any user needs to be given saap-cluster-admin
role , they can raise a request with Stakater team to assign the desired role to that user.
Items to be provided to Stakater Support
- User Email that needs to be assigned this group