• DevOps
    Case Study

    How we built a resilient multi-account, multi-cloud solution for a Health Tech service provider!

    READ CASESTUDY
    icon

    24/7 DevOps as a Service

    Round-the-clock DevOps for uninterrupted efficiency.

    icon

    Infrastructure as a Code

    Crafting infrastructure with ingenious code.

    icon

    CI/CD Pipeline

    Automated CI/CD pipeline for seamless deployments.

    icon

    DevSecOps

    Integrated security in continuous DevOps practices.

    icon

    Hire DevOps Engineers

    Level up your team with DevOps visionaries.

    icon

    Consulting Services

    Navigate success with expert DevOps consulting.

  • TechOps
    Case Study

    How we built a scalable Odoo solution for a Travel Tech service provider!

    READ CASESTUDY

    WEB HOSTING SUPPORT

    icon

    HelpDesk Support

    Highly skilled 24/7 HelpDesk Support

    icon

    Product Support

    Boost your product support with our expertise.

    MANAGED SERVICES

    icon

    Server Management

    Don’t let server issues slow you down. Let us manage them for you.

    icon

    Server Monitoring

    Safeguard your server health with our comprehensive monitoring solutions.

    STAFF AUGMENTATION

    icon

    Hire an Admin

    Transform your business operations with our expert administrative support.

    icon

    Hire a Team

    Augment your workforce with highly skilled professionals from our diverse talent pool.

  • CloudOps
    Case Study

    How we helped a Private Deemed University in India, save US $3500/m on hosting charges!

    READ CASESTUDY
    icon

    AWS Well Architected Review

    Round-the-clock for uninterrupted efficiency

    icon

    Optimize

    Efficient CloudOps mastery for seamless cloud management

    icon

    Manage

    Automated CI/CD pipeline for seamless deployments

    icon

    Migrate

    Upgrade the journey, Migrate & Modernize seamlessly

    icon

    Modernize

    Simplify compliance complexities with our dedicated services

    icon

    FinOps as a Service

    FinOps as a Service

  • SecOps
    Case Study

    How we built a scalable Odoo solution for TravelTech service provider!

    READ CASESTUDY
    icon

    VAPT

    Vulnerability Assessment and Penetration Testing

    icon

    Source Code Review

    Ensuring source code security ans safe practices to reduce risks

    icon

    Security Consultation

    On demand services for improving server security

    icon

    System Hardening

    Reduced vulnerability and proactive protection

    icon

    Managed SoC

    Monitors and maintains system security. Quick response on incidents.

    icon

    Compliance as a Service

    Regulatory compliance, reduced risk

  • Insights
    Case Study

    How we helped a Private Deemed University in India, save US $3,500/m on hosting charges!

    READ CASESTUDY
    icon

    Blog

    Explore our latest articles and insights

    icon

    Case Studies

    Read about our client success stories

    icon

    Flipbook

    Explore our latest Flipbook

    icon

    Events

    Join us at upcoming events and conferences

    icon

    Webinars

    Watch our educational webinar series

  • Our Story
  • Contact Us

Interested to collaborate?

Get in touch with us!

Ready to elevate your business with certified cloud expertise? Contact us today to learn how our team can help you leverage cloud technology to drive growth, streamline operations, and enhance security.

  • AWSAWS
  • Azure CloudAzure Cloud
  • Google CloudGoogle Cloud
  • Akamai CloudAkamai Cloud
  • OVHOVH
  • Digital OceanDigital Ocean
  • HetznerHetzner
  • Kubernetes Consultancy Services
  • K8s & Cloud native Solutions
  • 24/7 Infrastructure Monitoring
  • DevOps as a Service
  • Cloud CI/CD Solutions
  • White Labeled MSP Support
  • Our story
  • Life@SupportSages
  • Insights
  • Careers
  • Events
  • Contact Us

Connect with us!


LinkedInFacebookXInstagramYouTube

aws partneraws advanced partner
SupportSages

Copyright © 2008 – 2026 SupportSages Pvt Ltd. All Rights Reserved.
Privacy PolicyLegal TermsData ProtectionCookie Policy

Create new user account in Argo CD with Read Only Access

Admin

  • 6 min read
Create new user account in Argo CD with Read Only Access

Generating audio, please wait...

In the realm of Kubernetes continuous delivery, Argo CD is a popular choice, providing a declarative and GitOps-based approach for managing your applications. However, securing access to Argo CD is a paramount concern for many organizations. In this article, we’ll guide you through the process of creating secure Argo CD user account with read only access

A read-only user in a system, like Argo CD or any other application, has limited permissions that allow them to view data and configurations but not make changes. The primary uses of a read-only user are:

  1. Monitoring and Observability: Read-only users can access the system to monitor and observe the state of applications and resources. They can check the status, configuration, and history of deployments, pods, services, and other resources without the ability to modify them.
  2. Auditing and Compliance: Read-only access is valuable for auditing and compliance purposes. These users can review configurations and logs to ensure that the system is operating correctly and in compliance with security and regulatory requirements.
  3. Troubleshooting and Debugging: When issues or errors arise, read-only users can investigate and troubleshoot problems by examining the system’s current state and configurations. They can gather information to help resolve issues without making changes that might further complicate the situation.
  4. Training and Onboarding: Read-only access is useful for training new team members or onboarding users who are not yet familiar with the system. It allows them to explore the system’s features and configurations without the risk of unintentional changes.
  5. Security: Read-only users can be used in security roles to analyze and detect anomalies or potential security threats within the system without having the ability to modify the environment. They can act as security analysts or auditors.
  6. Sharing Information: Read-only users can access the system to share information with others. For example, a team lead might use a read-only account to show project progress and application status to stakeholders or team members.
  7. Read-Only Dashboards: Read-only users can be used to create read-only dashboards or reports that display real-time information from the system, providing insights to different stakeholders without the risk of accidental changes.

Overall, read-only users are valuable for providing visibility and transparency into a system, without the potential for unintended or unauthorized changes. They play a crucial role in maintaining system integrity, ensuring accountability, and facilitating collaboration while mitigating risks associated with unrestricted access.

Following are the sequence of activities for creating a new account for Argo CD with API key and RBAC permissions.

  1. Add account to argocd via configmap
  2. Add RBAC admin permission to user via configmap
  3. Create password for new Argo CD account

Add account to Argo CD via configmap

  1. Get the configmap argocd-cm of Argo CD by executing the below command.
kubectl get configmap argocd-cm -n argocd -o yaml > argocd-cm.yml

   2. Edit the configmap file argocd-cm.yml and add the below      line under "data" with new account login enabled

apiVersion: v1
data:
accounts.devuser: login
kind: ConfigMap
metadata:
annotations:
kubectl.kubernetes.io/last-applied-configuration: |

3. Apply the configmap by executing the below command . This will add a new account and allow that account to login via the Command Line Interface and Graphical User Interface.

kubectl apply -f argocd-cm.yml -n argocd

Add RBAC admin permission to user via configmap

  1. Get the configmap argocd-rbac-cm of Argo CD by executing the below command.
kubectl get configmap argocd-rbac-cm -n argocd -o yaml > argocd-rbac-cm.yml

2 . In this case we are using the default policy as readonly cause we are creating only one user with readonly access for logging purposes. Argo CD does have a default user that is created when you install and set up the Argo CD application. The default username for this user is admin. This user is typically assigned full administrative privileges, allowing them to manage applications, sync with Git repositories, create and update configurations, and perform other administrative tasks within Argo CD.

Edit the configmap file argocd-rbac-cm.yml and add the below section under “data” for the readonly user “devuser”

apiVersion: v1
data:
policy.csv: ""
policy.default: role:readonly
kind: ConfigMap
metadata:
annotations:
kubectl.kubernetes.io/last-applied-configuration: |

3 . Apply the configmap by executing the below command. This will add readonly permission to user devuser

kubectl apply -f argocd-rbac-cm.yml -n argocd

Create password for new Argo CD account

  1. Login into Argo CD as an admin account via Argo CLI by executing the below command.
argocd login SERVERIP or HOSTNAME

2. Create password to the new account by executing the below command. Password should contain at least one UPPERCASE.

argocd account update-password --account john --new-password Argo486
  • Login as devuser ,he can’t create or edit any resources except view them

1_2wRaPMdPUe7-ALU1nkVKVw.webp

 

Conclusion

The ability to offer read-only access is a fundamental practice in ensuring security, collaboration, and transparency within your Kubernetes environments. Whether you’re enabling your team to monitor and audit applications or extending access to external stakeholders, Argo CD’s RBAC capabilities allow you to strike that crucial balance between visibility and control.

By following the steps outlined here, you’ve gained the knowledge to create a read-only account tailored to your specific needs. This feature not only enhances security but also encourages collaboration, as users can safely explore and interact with the system without the risk of unintended changes.

As your Kubernetes and Argo CD journey progresses, remember the importance of fine-tuning user roles to meet the unique requirements of your projects. Whether you’re empowering your team, streamlining audits, or simply granting read-only access to interested parties, the flexibility and control provided by Argo CD’s RBAC system are invaluable assets.

So, go ahead, empower your team, engage stakeholders, and enhance your Kubernetes management practices with Argo CD’s read-only access. With this newfound knowledge, you’re ready to take your Kubernetes deployments to the next level. Happy coding and deploying!”

Uncover the power of secure, read-only access in Argo CD! Explore steps to create controlled user roles, fostering heightened security and collaborative transparency in Kubernetes. Discover more at SupportSages and empower your DevOps journey. Elevate Kubernetes management practices and foster collaboration while maintaining system integrity.

  • AWS
  • DevOps

Continue Your Journey With…

DevOps as a Service

DevOps as a Service

Let us do the heavy lifting for you

Promotional banner
Promotional banner

5 Things You Should Know About AWS Well-Architected Framework Review

5 Things You Should Know About AWS Well-Architected Framework Review
  • AWS
logo

Automating IAM user Audit Using Python.

Automating IAM user Audit Using Python.
  • AWS
  • DevOps
logo

Automating SSM Parameter store backup using Python.

Automating SSM Parameter store backup using Python.
  • AWS
  • DevOps
logo

Effortless S3 Bucket Access Log Activation Across Your AWS Account with Python Automation

Effortless S3 Bucket Access Log Activation Across Your AWS Account with Python Automation
  • AWS
  • DevOps
logo
Create new user account in Argo CD with Read Only Access

Posts by Admin