Skip to content

Security & RBAC

Kubernaut follows a least-privilege model: each service runs under its own ServiceAccount with only the permissions it needs. This page is the consolidated reference for all RBAC resources created by the Helm chart.

Signal Ingestion

The Gateway authenticates every signal ingestion request using Kubernetes TokenReview + SubjectAccessReview (SAR):

sequenceDiagram
    participant AM as AlertManager
    participant GW as Gateway
    participant K8s as Kubernetes API

    AM->>GW: POST /api/v1/signals/prometheus<br/>Authorization: Bearer <token>
    GW->>K8s: TokenReview (validate token)
    K8s-->>GW: Authenticated as SA "alertmanager-..."
    GW->>K8s: SubjectAccessReview<br/>(can SA create services/gateway-service?)
    K8s-->>GW: Allowed
    GW->>GW: Process signal, create RemediationRequest

Gateway RBAC

The Gateway's own ClusterRole (gateway-role) includes:

apiGroup Resources Verbs Purpose
kubernaut.ai remediationrequests, remediationrequests/status create, get, list, watch, update, patch Create and manage RRs from incoming signals
(core) namespaces get, list, watch Scope label checks (kubernaut.ai/managed)
(core) nodes, pods, services, persistentvolumes get, list, watch Owner chain resolution for fingerprinting
apps deployments, replicasets, statefulsets, daemonsets get, list, watch Owner chain resolution
batch jobs, cronjobs get, list, watch Owner chain resolution
authentication.k8s.io tokenreviews create Validate bearer tokens from signal sources
authorization.k8s.io subjectaccessreviews create Check signal source RBAC via SAR
coordination.k8s.io leases get, create, update, delete Leader election

Signal Source RBAC

External signal sources (AlertManager, custom webhooks) must satisfy two requirements:

  1. A valid bearer token -- The source must send its ServiceAccount token in the Authorization header. The Gateway validates it via TokenReview.
  2. SAR authorization -- The ServiceAccount must have create permission on services/gateway-service. The chart provides the gateway-signal-source ClusterRole for this:

    # gateway-signal-source ClusterRole
    rules:
      - apiGroups: [""]
        resources: ["services"]
        resourceNames: ["gateway-service"]
        verbs: ["create"]
    

The Helm value gateway.auth.signalSources creates a ClusterRoleBinding for each entry:

gateway:
  auth:
    signalSources:
      - name: alertmanager
        serviceAccount: alertmanager-kube-prometheus-stack-alertmanager
        namespace: monitoring

If you deploy a Kubernetes Event Exporter separately (not included in the chart since v1.1), its ServiceAccount must also be registered as a signal source in the same signalSources list.

Without the bearer token, the Gateway returns 401 Unauthorized. Without the ClusterRoleBinding, the Gateway returns 403 Forbidden.

See Installation for the complete AlertManager configuration example.

CRD Controllers

Each CRD controller runs under its own ServiceAccount with a dedicated ClusterRole scoped to the CRDs it manages. All controllers also get a namespace-scoped Role for reading ConfigMaps and Secrets in the release namespace (Rego policies, credentials).

Four services (HolmesGPT API, WorkflowExecution, RemediationOrchestrator, EffectivenessMonitor) include read access to security.istio.io and networking.istio.io resources for service mesh awareness during investigation and remediation.

Controller ServiceAccount CRDs Managed Additional Access Notes
RemediationOrchestrator remediationorchestrator-controller All 7 child CRDs (full CRUD) Pods, nodes, events, namespaces, services, deployments, statefulsets, daemonsets, jobs, cronjobs (read) Broadest permissions -- creates and watches all child CRDs
SignalProcessing signalprocessing-controller SignalProcessing, RemediationRequest Pods, services, namespaces, nodes, events, deployments, replicasets, statefulsets, daemonsets, HPAs, PDBs, network policies (read); leases (full) Owner chain resolution and enrichment
AIAnalysis aianalysis-controller AIAnalysis Events (create) Also bound to holmesgpt-api-client for HolmesGPT access and data-storage-client for DataStorage access
WorkflowExecution workflowexecution-controller WorkflowExecution Tekton PipelineRuns (full), TaskRuns (read), Jobs (full), events (create); leases (full) Creates Jobs and PipelineRuns in the execution namespace. When the ansible engine is enabled, also requires get on the AWX API token Secret -- see Ansible Engine Setup.
EffectivenessMonitor effectivenessmonitor-controller EffectivenessAssessment, RemediationRequest (read) Pods, nodes, services, PVCs, events, deployments, replicasets, statefulsets, daemonsets, HPAs, PDBs, jobs, cronjobs (read) Post-remediation health checks
Notification notification-controller NotificationRequest Events (create) Minimal scope
AuthWebhook authwebhook All Kubernaut CRDs (read), status subresources (update, patch) -- Admission webhook validation, defaulting, and catalog registration. Intercepts CREATE and UPDATE operations on RemediationWorkflow CRDs. Uses retry-on-conflict for ActionType status updates.

Broad Read Access via view ClusterRole

The RemediationOrchestrator and EffectivenessMonitor are additionally bound to the Kubernetes built-in view ClusterRole via remediationorchestrator-view and effectivenessmonitor-view ClusterRoleBindings. This provides broad read access to CRD types not individually enumerated in their dedicated ClusterRoles -- for example, cert-manager Certificate resources and Istio networking resources -- which is required for pre- and post-remediation hash capture (DD-EM-002).

If the view ClusterRole lacks read permission for a particular resource type (e.g., a third-party CRD), the Remediation Orchestrator emits a HashCaptureDegraded Kubernetes event on the RemediationRequest when CapturePreRemediationHash returns a degraded reason. The EffectivenessAssessment then proceeds in degraded mode — the EA skips the hash comparison component and relies on the remaining health-check signals (alert state, metric thresholds, pod readiness) to determine effectiveness.

Workflow Execution

Remediation workflows (Jobs, Tekton PipelineRuns, Ansible playbooks) execute in the kubernaut-workflows namespace under the kubernaut-workflow-runner ServiceAccount. This is the broadest ClusterRole in the system because workflows need to act on the cluster to remediate issues.

apiGroup Resources Verbs Purpose
apps deployments, statefulsets, daemonsets get, list, patch, update Scale, restart, or patch workloads
apps replicasets get, list, watch Read replica state
(core) pods, pods/eviction get, list, create, delete Evict pods, read pod state
(core) configmaps, secrets get, list, create, update, patch, delete Read/write configuration
(core) nodes get, list Read node state for drain/cordon
(core) namespaces, services, persistentvolumeclaims get, list Read cluster state
autoscaling horizontalpodautoscalers get, list, patch Scale HPAs
policy poddisruptionbudgets get, list, patch Adjust PDBs during remediation
networking.k8s.io networkpolicies get, list, create, update, patch, delete Manage network policies
argoproj.io applications get, list Read ArgoCD application state
cert-manager.io certificates, clusterissuers get, list Read certificate state
policy.linkerd.io authorizationpolicies, servers, meshtlsauthentications get, list, delete Manage Linkerd policies (legacy)
security.istio.io authorizationpolicies, peerauthentications, requestauthentications get, list, delete Manage Istio security policies
networking.istio.io virtualservices, destinationrules, gateways, serviceentries get, list, create, update, patch, delete Manage Istio networking resources
kubernaut.ai workflowexecutions get Ansible playbooks read WFE ownerReferences for RR correlation
storage.k8s.io storageclasses get, list Discover default StorageClass for PVC migration
(core) endpoints get, list Check service endpoint health
batch jobs get, list, create, delete pg_dump/pg_restore Job lifecycle (disk-pressure-emptydir scenario)

The last four rules were added for production Ansible playbooks (DD-WE-007). In v1.2, per-workflow SA scoping (#501) will replace the shared ClusterRole with schema-declared RBAC per execution.

Additionally, a namespace-scoped workflowexecution-dep-reader Role grants get, list, watch on Secrets and ConfigMaps in the execution namespace for dependency validation before workflow launch.

Per-workflow scoped RBAC

All workflows share the kubernaut-workflow-runner ServiceAccount. Per-workflow scoped RBAC (restricting each workflow to only the resources it needs) is planned for v1.2.

OCP Monitoring RBAC

When effectivenessmonitor.external.ocpMonitoringRbac is true, the chart creates additional RBAC resources for EM to access OCP's monitoring stack through kube-rbac-proxy:

Resource Kind Purpose
effectivenessmonitor-monitoring-view ClusterRoleBinding Binds EM ServiceAccount to the built-in cluster-monitoring-view ClusterRole for Prometheus API access
kubernaut-alertmanager-view ClusterRole Grants get on monitoring.coreos.com/alertmanagers/api for AlertManager API access through kube-rbac-proxy
effectivenessmonitor-alertmanager-view ClusterRoleBinding Binds EM ServiceAccount to kubernaut-alertmanager-view

The AlertManager ClusterRole and ClusterRoleBinding are only created when both ocpMonitoringRbac and alertManagerEnabled are true.

OCP's kube-rbac-proxy requires resource-level RBAC (monitoring.coreos.com/alertmanagers/api) rather than nonResourceURLs for AlertManager API access. Standard nonResourceURLs rules are silently ignored by kube-rbac-proxy, causing EM AlertManager queries to fail with 403 Forbidden.

Ansible Credential Injection

When the Ansible/AWX execution engine is enabled, the WorkflowExecution controller injects the cluster's Kubernetes API credentials into AWX Job Templates so that kubernetes.core Ansible modules can authenticate against the target cluster. The v2 custom credential type (kubernaut-k8s-bearer-token-v2) uses kubeconfig-file injection rather than environment variables, because in-cluster ServiceAccount config inside AAP execution environments takes precedence over K8S_AUTH_* env vars. If resolution picks a built-in or kind-matched type, the injector may differ.

The credential type resolution follows a 6-step process:

  1. Look for the built-in AWX type ("OpenShift or Kubernetes API Bearer Token")
  2. Look up a credential type by kind (FindCredentialTypeByKind("kubernetes", true))
  3. Fall back to kubernaut-k8s-bearer-token (custom type from earlier versions)
  4. Fall back to kubernaut-k8s-bearer-token-v2 (kubeconfig-based type)
  5. If none exist, create the v2 type with a Jinja2 kubeconfig template that AWX renders at job launch
  6. Create an ephemeral credential populated with the controller's in-cluster SA token, API server host, and CA certificate

The v2 kubeconfig template conditionally includes certificate-authority-data when the cluster CA is available, or sets insecure-skip-tls-verify: true otherwise. AWX injects the rendered kubeconfig as a temp file and sets K8S_AUTH_KUBECONFIG to point to it, ensuring kubernetes.core modules use the injected credentials instead of in-cluster config.

Ephemeral credentials are cleaned up after the AWX job completes. See BR-WE-017 for the full shared SA model and the planned v1.2 transition to per-workflow ServiceAccounts.

Internal Service Communication

DataStorage Authentication

DataStorage uses the same TokenReview + SAR pattern as the Gateway. The data-storage-auth-middleware ClusterRole grants DataStorage permission to validate client tokens:

apiGroup Resources Verbs
authentication.k8s.io tokenreviews create
authorization.k8s.io subjectaccessreviews create

Clients must have create permission on services/data-storage-service (via the data-storage-client ClusterRole). The chart binds every Kubernaut service to this role:

Gateway, SignalProcessing, RemediationOrchestrator, AIAnalysis, WorkflowExecution, EffectivenessMonitor, Notification, AuthWebhook, HolmesGPT API, and DataStorage itself.

HolmesGPT API Access

The AIAnalysis controller communicates with HolmesGPT API via the holmesgpt-api-client ClusterRole, which grants create and get on services/holmesgpt-api.

HolmesGPT API itself has a broad read-only ClusterRole (holmesgpt-api-investigator) for its kubectl-based investigation:

apiGroup Resources Verbs Purpose
(core) pods, pods/log, events, services, endpoints, configmaps, secrets, nodes, namespaces, replicationcontrollers, PVCs, resourcequotas get, list, watch Cluster state investigation
apps deployments, replicasets, statefulsets, daemonsets get, list, watch Workload investigation
batch jobs, cronjobs get, list, watch Job investigation
events.k8s.io events get, list, watch Event investigation
autoscaling horizontalpodautoscalers get, list, watch HPA investigation
policy poddisruptionbudgets get, list, watch PDB investigation
networking.k8s.io networkpolicies get, list, watch Network policy investigation
cert-manager.io certificates, clusterissuers, certificaterequests get, list, watch Certificate investigation
argoproj.io applications get, list, watch ArgoCD investigation
policy.linkerd.io servers, authorizationpolicies, meshtlsauthentications get, list, watch Linkerd mesh investigation (legacy)
security.istio.io authorizationpolicies, peerauthentications, requestauthentications get, list, watch Istio security policy investigation
networking.istio.io virtualservices, destinationrules, gateways, serviceentries get, list, watch Istio networking investigation
monitoring.coreos.com prometheusrules, servicemonitors, podmonitors, probes get, list, watch Monitoring investigation

This read-only access allows the LLM to investigate root causes using live cluster data without making changes.

Infrastructure and Hooks

PostgreSQL and Valkey

Both run with dedicated ServiceAccounts that have automountServiceAccountToken: false, preventing unnecessary API token mounting.

Helm Hooks

The shared hook ServiceAccount (kubernaut-hook-sa) and its ClusterRole are used by TLS certificate generation jobs, the database migration job, and the CRD upgrade job:

apiGroup Resources Verbs Purpose
(core) secrets, configmaps get, create, update, patch, delete TLS cert/CA storage, migration state
admissionregistration.k8s.io mutatingwebhookconfigurations, validatingwebhookconfigurations get, patch Patch caBundle (hook mode only, see #334)
apiextensions.k8s.io customresourcedefinitions get, list, create, update, patch CRD pre-upgrade server-side apply (#521)
(core) pods get, list Post-install verification
apps deployments get Post-install verification
batch jobs get, list Migration job monitoring

Hook jobs only run during helm install, helm upgrade, and helm delete. They do not have long-lived pods.

Next Steps