Skip to content

Root Admin (default user: 'Opstella')

Role Description

The highest role in the Opstella system. This is the role of the Opstella user, created with the company. Only the Opstella user has this role and access to all permissions in the system.

Permission on DevOpsTool

Because Admin (Opstella) is the highest role in the Opstella system, it can use all DevOpstool.

GitLab

Manage Repository

  • Access and manage all repositories
  • Edit repository settings
  • Create, edit, and delete branches
  • Control and manage tags
  • Manage webhooks

Merge Requests

  • Create, edit, and delete merge requests
  • Review and accept merge requests
  • Use squash and merge options

Issues

  • Create, edit, and delete issues
  • Manage issue boards
  • Define, edit, and delete labels
  • Manage milestones and epics

CI/CD

  • Manage pipelines and jobs
  • Edit, delete, and trigger pipelines
  • View logs of jobs

Permissions

  • Invite new members to the project
  • Change roles of members with lower permissions

Protected Branches and Tags

  • Manage protected branches and protected tags
  • Define who can push, merge, and tag in branches and tags that are protected

Wiki and Snippets

  • Create, edit, and delete wiki pages
  • Manage project snippets

Sonarqube

Browse

  • View the project and all related information (e.g., metrics, dashboards, and analysis results)
  • View code analysis results but cannot make any edits

See Source Code

  • View source code analyzed by SonarQube
  • Use to see context of issues and security hotspots that SonarQube detects in source code

Administer Issues

  • Manage detected issues (e.g., change status, add comments, assign responsibility, and set priority)
  • Customize rules and profiles related to issue analysis

Administer Security Hotspots

  • Manage security hotspots (e.g., change status, add comments, assign responsibility, and set priority)
  • Customize rules and profiles related to security hotspot analysis

Administer

  • Highest level of project permissions
  • Customize project settings (e.g., change project name, set branch defaults, and adjust permissions)
  • Manage user permissions in the project
  • Customize quality profiles and quality gates

Execute Analysis

  • Analyze source code and submit results to SonarQube
  • This permission is required to configure CI/CD pipelines to run automated analysis

Harbor

Manage Repositories

  • Create, delete, and configure repositories within the project
  • Push and pull artifacts (e.g., Docker images, Helm charts) to/from the repository
  • View and manage tags within the repository

Manage Project Members

  • Invite new members to the project
  • Assign roles to members within the project (but cannot edit admin permissions)

Manage Permissions

  • Manage user access and permissions within the project
  • Configure access policies for repositories

Artifact Management

  • Scan artifacts for vulnerabilities and security problems
  • View scan results and manage identified issues
  • Sign and verify artifact signatures for security

Replication

  • Configure and manage replication rules to replicate artifacts to/from other Harbor instances

Grafana

View Charts and Data

  • View charts and data in the organization but cannot edit or change the data

Create and Edit Private Charts

  • Create and edit only personal charts (Private Dashboard) that cannot be shared or accessed by other users

Customize Display

  • Customize the display of viewed charts

Set Notifications

  • Set notifications only for oneself; cannot set notifications for other users

Vault

create

  • Allows creating new data in Vault

read

  • Allows reading existing data in Vault

update

  • Allows editing existing data in Vault

delete

  • Allows deleting data from Vault

list

  • Allows listing data in Vault

Headlamp

Resources

  • pods , pods/log , services , endpoints , secrets , deployments , jobs , cronjobs , configmaps , persistentvolumeclaims , ingresses , daemonsets , events , replicasets , replicationcontrollers , statefulsets
  • Retrieve (get) and display information about the resources listed above within the service (namespace) but cannot perform other actions such as create or update

ArgoCD

  • Create, edit, and delete applications
  • Synchronize applications manually
  • Trigger actions on applications such as sync verification, reset, and abort sync
  • View and manage application-related resources such as deployments, services, secrets, configmaps
  • View and analyze application metrics such as CPU, memory, network usage

Kubernetes

Kubernetes Config

kube-non-production-admin-role

  • pods : View, edit, create, delete, and manage all pods in the cluster
  • pods/log : View logs of any pod in the cluster
  • services : View, edit, create, delete, and manage all services in the cluster
  • endpoints : View all endpoints in the cluster
  • secrets : View, edit, create, delete, and manage all secrets in the cluster
  • deployments : View, edit, create, delete, and manage all deployments in the cluster
  • jobs : View, edit, create, delete, and manage all jobs in the cluster
  • cronjobs : View, edit, create, delete, and manage all cronjobs in the cluster
  • configmaps : View, edit, create, delete, and manage all configmaps in the cluster
  • persistentvolumeclaims : View, edit, create, delete, and manage all persistentvolumeclaims in the cluster
  • ingresses : View, edit, create, delete, and manage all ingresses in the cluster
  • daemonsets : View, edit, create, delete, and manage all daemonsets in the cluster
  • events : View all events in the cluster
  • replicasets : View, edit, create, delete, and manage all replicasets in the cluster
  • replicationcontrollers : View all replicationcontrollers in the cluster
  • statefulsets : View, edit, create, delete, and manage all statefulsets in the cluster

kube-production-admin-role

  • pods : View, edit, create, delete, and manage all pods in the cluster
  • pods/log : View logs of any pod in the cluster
  • services : View, edit, create, delete, and manage all services in the cluster
  • endpoints : View all endpoints in the cluster
  • secrets : View, edit, create, delete, and manage all secrets in the cluster
  • deployments : View, edit, create, delete, and manage all deployments in the cluster
  • jobs : View, edit, create, delete, and manage all jobs in the cluster
  • cronjobs : View, edit, create, delete, and manage all cronjobs in the cluster
  • configmaps : View, edit, create, delete, and manage all configmaps in the cluster
  • persistentvolumeclaims : View, edit, create, delete, and manage all persistentvolumeclaims in the cluster
  • ingresses : View, edit, create, delete, and manage all ingresses in the cluster
  • daemonsets : View, edit, create, delete, and manage all daemonsets in the cluster
  • events : View all events in the cluster
  • replicasets : View, edit, create, delete, and manage all replicasets in the cluster
  • replicationcontrollers : View all replicationcontrollers in the cluster
  • statefulsets : View, edit, create, delete, and manage all statefulsets in the cluster

We build Enterprise Platform Engineering to digitalized transform your organization into a DevSecOps culture.