Role-based Access Control Model #
To be able to deploy the operator itself and Flink jobs, we define two separate Kubernetes
roles.
The former, called flink-operator
role is used to manage the flinkdeployments
, to create and manage the
JobManager deployment
for each Flink job and other resources like services.
The latter, called the flink
role is used by the JobManagers of the jobs to create and manage the
TaskManagers and
ConfigMaps for the job.
These service accounts and roles can be created via the operator Helm chart.
By default the flink-operator
role is cluster scoped (created as a clusterrole
) and thus allowing a single operator
instance to be responsible for all Flink deployments (jobs) in a Kubernetes cluster regardless of the namespace they are
deployed to (with the additional instruction below). Certain environments are more restrictive and only allow namespaced roles, so we also support this option
via watchNamespaces.
The flink
role is always namespaced, by default it is created in the namespace of the operator. When
watchNamespaces is enabled it is created for all
watched namespaces individually.
Cluster Scoped Flink Operator With Jobs Running in Other Namespaces #
The steps described in the quick-start let users install Flink operator and run Flink jobs in the default namespace. To run Flink jobs in another namespace, users are responsible for creating a flink service account in that namespace. This is when users deploy cluster scoped Flink operator without using the --set watchNamespaces={namespaces}
option and wish to create Flink jobs in other namespaces later.
For each additional namespace that runs the Flink jobs, users need to do the following:
- Switch to the namespace by running:
kubectl config set-context --current --namespace=CHANGEIT
- Create the service account, role, and role binding in the namespace using the commands below:
kubectl apply -f - <<EOF apiVersion: v1 kind: ServiceAccount metadata: labels: app.kubernetes.io/name: flink-kubernetes-operator app.kubernetes.io/version: 1.0.1 name: flink --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: labels: app.kubernetes.io/name: flink-kubernetes-operator app.kubernetes.io/version: 1.0.1 name: flink rules: - apiGroups: - "" resources: - pods - configmaps verbs: - '*' - apiGroups: - apps resources: - deployments verbs: - '*' --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: labels: app.kubernetes.io/name: flink-kubernetes-operator app.kubernetes.io/version: 1.0.1 name: flink-role-binding roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: flink subjects: - kind: ServiceAccount name: flink EOF
- Optionally create an example Flink job in the namespace. Run the command from the root of the cloned flink-kuberntes-operator repo:
kubectl apply -f example/basic.yaml