Creating ServiceAccount, Role, and RoleBinding


To deploy BMC Helix IT Operations Management (BMC Helix ITOM), you must have permission to create ServiceAccount, Role, and RoleBinding in the BMC Helix ITOM namespace.

If you do not have permission, an administrator must perform the following steps to create a Service account, Role, and RoleBinding to enable you to deploy BMC Helix ITOM:

  1. In the commons/yaml_files/serviceAccount.yaml and commons/yaml_files/role_rolebinding.yaml file replace the following values:
    • __SERVICE_ACCOUNT__ with the name of the service account that you want to create.
    • __NAMESPACE__ with the BMC Helix ITOM namespace.
  2. To create a service account, run the following command :

    kubectl apply -f serviceAccount.yaml
  3.  To create role and rolebinding, run the following command:

    kubectl apply -f role_rolebinding.yaml

When you set the CUSTOM_SERVICEACCOUNT_NAME parameter in the infra.config file, replace helix-onprem-sa with the service account name that you created.

Important

The uninstallation script deletes the custom service account.
If you have created a custom service account, after performing an uninstallation, you must recreate the custom service account.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*