Gloo Gateway RBAC Configuration

Conditional Installation

You may want to prevent Gloo Gateway’s RBAC resources from being created at install time. An example of this use case is if you are installing to a cluster where you have insufficient permissions to create privileged resources like RBAC roles and role-bindings.

Gloo Gateway’s RBAC resources will not be installed if the Helm flag global.glooRbac.create is set to false.

In Enterprise deployments of Gloo Gateway, our Grafana and Prometheus subcharts will still attempt to create their own RBAC resources. If you would like to prevent those resources from being created as well, you must also set the flags grafana.rbac.create and prometheus.rbac.create to false.


Uniquely Identifying Cluster-Scoped Resources

By default, Gloo Gateway’s RBAC resources are created as cluster-scoped. This may present a problem if, for example, you upgrade Gloo Gateway by performing a blue-green deployment and deploying Gloo Gateway to two namespaces simultaneously within the same cluster. The identically-named cluster-scoped roles and role-bindings will conflict with each other and will cause an error.

To resolve this, you may set the Helm flag global.glooRbac.nameSuffix to some string of your choosing. That will cause the string "-$nameSuffix" to be appended to the roles' and role-bindings' names, where $nameSuffix is the string you passed to the Helm flag. For example, setting global.glooRbac.nameSuffix to the string "blue-deployment" will cause the ClusterRole normally named gloo-resource-reader to instead be named gloo-resource-reader-blue-deployment.

For Enterprise deployments of Gloo Gateway: Our Grafana and Prometheus subcharts currently do not allow customization of their own RBAC resources' names, so you may still have a conflict on these. The current best-practice is to either disable the install of Grafana/Prometheus, or manually fix after installation.