You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Feast services currently support RBAC configuration via the feature_store.yaml, which is managed by the Feast Operator in Kubernetes environments. To enable proper authorization setup by feature store administrators, the Feast Operator should also provide capabilities to define and enforce consistent RBAC settings across all services.
Additionally, sensitive information such as IDP server credentials should be protected using encoded secrets within the deployment namespace.
Describe the solution you'd like
Authorization settings must be given in the FeatureStore custom resource and be propagated by the operator to the deployed Feast services.
Describe alternatives you've considered
Since the operator reconciles all changes to the deployed applications to match the latest state of the FeatureStore resource, there are no alternatives that we could consider in order to inject the authorization settings, located in the feature_store.yaml, into the Feast services.
Is your feature request related to a problem? Please describe.
Feast services currently support RBAC configuration via the
feature_store.yaml
, which is managed by the Feast Operator in Kubernetes environments. To enable proper authorization setup by feature store administrators, the Feast Operator should also provide capabilities to define and enforce consistent RBAC settings across all services.Additionally, sensitive information such as IDP server credentials should be protected using encoded secrets within the deployment namespace.
This issue relates to #4561.
Describe the solution you'd like
Authorization settings must be given in the
FeatureStore
custom resource and be propagated by the operator to the deployed Feast services.Describe alternatives you've considered
Since the operator reconciles all changes to the deployed applications to match the latest state of the
FeatureStore
resource, there are no alternatives that we could consider in order to inject the authorization settings, located in thefeature_store.yaml
, into the Feast services.Additional context
The text was updated successfully, but these errors were encountered: