Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RBAC configuration in the Feast operator #4765

Closed
dmartinol opened this issue Nov 18, 2024 · 1 comment
Closed

RBAC configuration in the Feast operator #4765

dmartinol opened this issue Nov 18, 2024 · 1 comment
Labels
kind/feature New feature or request

Comments

@dmartinol
Copy link
Contributor

Is your feature request related to a problem? Please describe.
Feast services currently support RBAC configuration via the feature_store.yaml, which is managed by the Feast Operator in Kubernetes environments. To enable proper authorization setup by feature store administrators, the Feast Operator should also provide capabilities to define and enforce consistent RBAC settings across all services.
Additionally, sensitive information such as IDP server credentials should be protected using encoded secrets within the deployment namespace.

This issue relates to #4561.

Describe the solution you'd like
Authorization settings must be given in the FeatureStore custom resource and be propagated by the operator to the deployed Feast services.

Describe alternatives you've considered
Since the operator reconciles all changes to the deployed applications to match the latest state of the FeatureStore resource, there are no alternatives that we could consider in order to inject the authorization settings, located in the feature_store.yaml, into the Feast services.

Additional context

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant