Replies: 1 comment 1 reply
-
|
If I understand your use case correctly, yes this is possible. Namespace isolation is a very common practice and Argo CD was designed to accommodate this as a pattern. Argo has a feature called projects, which are provisioned for developers by cluster operators. See: https://argoproj.github.io/argo-cd/user-guide/projects/. The idea is that a cluster operator will create a project for a development team and do the following:
|
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hello All,
I am new to Argo CD and we're setting up Argo CD in our environments and wanted to clarify few things.
Our developers are restricted to a single namespace in Dev and production environments, with more access in Dev than in production cluster(Kubernetes RBAC in place).
We use LDAP groups to restrict access to OpenShift web and oc CLI for authentication & authorization to assigned namespace(s). Wondering if we could use similar approach for configuring SSO and control Developers access to Argo CD web UI and CLI, not to allow Kubernetes deployments and Applications set up into assigned namespace only.
Based on my limited knowledge it appears to be possible, but haven't tried worked on that yet.
Please correct me if my understanding is incorrect or this is not a recommended practice for Argo CD.
This approach would help us to have a single Argo CD set up per cluster, to avoid setting it up for each namespace.
Please provide any insight on this if anyone has done similar set up.
Thanks
Beta Was this translation helpful? Give feedback.
All reactions