Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

serviceAccount name override for each statefulset separately #3175

Open
sheinat-ab opened this issue Jul 30, 2023 · 0 comments
Open

serviceAccount name override for each statefulset separately #3175

sheinat-ab opened this issue Jul 30, 2023 · 0 comments
Labels
enhancement New feature or request

Comments

@sheinat-ab
Copy link

**Is your feature request related to a problem?

Hi! We are using otel prometheus receiver(not to replace prometheus, but instead of telegraf and remote write). In order to scrape kubelet and CA advisor metrics, we need "nodes/metrics" permissions in the ClusterRole. Although, we do see in the latest version that you can use otel collector and deploy a clusterrole with these permissions, we would like general override support of statefulset serviceaccounts or to add "nodes/metrics" to the sumologic ClusterRole.

Describe the solution you'd like A clear and concise description of what you want to happen.

We would like "nodes/metrics" permissions to be added to the sumologic ClusterRole OR better-yet, serviceAccount override name support for each statefulset, so that we can have the metrics statefulset use a custom serviceAccount with permissions to scrape ca advisor metrics.

Describe alternatives you've considered A clear and concise description of any alternative solutions or features you've considered.

We either need to manage the sumologic helm chart files locally or edit clusterrole permissions after the helm chart is deployed.

Additional context Add any other context or screenshots about the feature request here.

For users who are adding custom processors/receiver/configuration for otel metrics, they should also be able to manage which serviceAccounts should be used according to the permissions that are needed to scrape targets

@sheinat-ab sheinat-ab added the enhancement New feature or request label Jul 30, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant