From 960772ca516853b5030def7bea4b40e29fe9829e Mon Sep 17 00:00:00 2001 From: kahirokunn Date: Mon, 4 Aug 2025 08:56:40 +0900 Subject: [PATCH] Remove outdated cert-manager RBAC configuration Default ClusterRole permissions already allow cross-namespace secret creation Signed-off-by: kahirokunn --- ...-rotating-control-plane-tls-credentials.md | 40 ------------------- 1 file changed, 40 deletions(-) diff --git a/linkerd.io/content/2-edge/tasks/automatically-rotating-control-plane-tls-credentials.md b/linkerd.io/content/2-edge/tasks/automatically-rotating-control-plane-tls-credentials.md index b69f5519de..3deedff34b 100644 --- a/linkerd.io/content/2-edge/tasks/automatically-rotating-control-plane-tls-credentials.md +++ b/linkerd.io/content/2-edge/tasks/automatically-rotating-control-plane-tls-credentials.md @@ -149,46 +149,6 @@ helm install \ --wait ``` -Finally, we'll need to update cert-manager's RBAC permissions. By default -cert-manager will only create certificate secrets in the namespace where it is -installed. Linkerd, however, requires its identity issuer to be created in the -`linkerd` namespace. To allow this, we create a `ServiceAccount` for -cert-manager in the `linkerd` namespace with the required permissions. - -```bash -kubectl apply -f - <