|
2 | 2 |
|
3 | 3 | copyright:
|
4 | 4 | years: 2024, 2024
|
5 |
| -lastupdated: "2024-10-07" |
| 5 | +lastupdated: "2024-10-10" |
6 | 6 |
|
7 | 7 |
|
8 | 8 | keywords: openshift, {{site.data.keyword.openshiftlong_notm}}, kubernetes, infrastructure, rbac, policy, role-based access control
|
@@ -120,7 +120,7 @@ To create custom RBAC permissions,
|
120 | 120 | | `rules.apiGroups` | Specify the Kubernetes [API groups](https://kubernetes.io/docs/reference/using-api/#api-groups){: external} that you want users to be able to interact with, such as `"apps"`, `"batch"`, or `"extensions"`. For access to the core API group at REST path `api/v1`, leave the group blank: `[""]`. |
|
121 | 121 | | `rules.resources` | Specify the Kubernetes [resource types](https://kubernetes.io/docs/reference/kubectl/quick-reference/){: external} to which you want to grant access, such as `"daemonsets"`, `"deployments"`, `"events"`, or `"ingresses"`. If you specify `"nodes"`, then the kind must be `ClusterRole`. |
|
122 | 122 | | `rules.verbs` | Specify the types of [actions](https://kubectl.docs.kubernetes.io/){: external} that you want users to be able to do, such as `"get"`, `"list"`, `"describe"`, `"create"`, or `"delete"`. |
|
123 |
| - {: caption="Table 3. Understanding the YAML parameters" caption-side="bottom"} |
| 123 | + {: caption="Understanding the YAML parameters" caption-side="bottom"} |
124 | 124 |
|
125 | 125 | 1. Create the role or cluster role in your cluster.
|
126 | 126 |
|
@@ -180,7 +180,7 @@ To create custom RBAC permissions,
|
180 | 180 | | `roleRef.kind` | Enter the same value as the `kind` in the role `.yaml` file: `Role` or `ClusterRole`. |
|
181 | 181 | | `roleRef.name` | Enter the name of the role `.yaml` file. |
|
182 | 182 | | `roleRef.apiGroup` | Use `rbac.authorization.k8s.io`. |
|
183 |
| - {: caption="Table 3. Understanding the YAML parameters" caption-side="bottom"} |
| 183 | + {: caption="Understanding the YAML parameters" caption-side="bottom"} |
184 | 184 |
|
185 | 185 | 1. Create the role binding or cluster role binding resource in your cluster.
|
186 | 186 |
|
@@ -265,7 +265,7 @@ Before you begin: [Access your {{site.data.keyword.redhat_openshift_notm}} clust
|
265 | 265 | | `rules.apiGroups` | Specify the Kubernetes [API groups](https://kubernetes.io/docs/reference/using-api/#api-groups){: external} that you want users to be able to interact with, such as `"apps"`, `"batch"`, or `"extensions"`. For access to the core API group at REST path `api/v1`, leave the group blank: `[""]`. |
|
266 | 266 | | `rules.resources` | Specify the Kubernetes [resource types](https://kubernetes.io/docs/reference/kubectl/quick-reference/){: external} to which you want to grant access, such as `"daemonsets"`, `"deployments"`, `"events"`, or `"ingresses"`. |
|
267 | 267 | | `rules.verbs` | Specify the types of [actions](https://kubectl.docs.kubernetes.io/){: external} that you want users to be able to do, such as `"get"`, `"list"`, `"describe"`, `"create"`, or `"delete"`. |
|
268 |
| - {: caption="Table 4. Understanding the YAML parameters" caption-side="bottom"} |
| 268 | + {: caption="Understanding the YAML parameters" caption-side="bottom"} |
269 | 269 |
|
270 | 270 | 2. Create the cluster role in your cluster. Any users that have a role binding to the `admin` cluster role now have the additional permissions from the `view-pod-metrics` cluster role.
|
271 | 271 | ```sh
|
@@ -369,7 +369,7 @@ The following table shows the Kubernetes resource permissions that are granted b
|
369 | 369 | | Writer role | When scoped to one namespace: **`edit`** cluster role applied by the **`ibm-edit`** role binding in that namespace. \n \n When scoped to all namespaces: **`edit`** cluster role applied by the **`ibm-edit`** role binding in each namespace of the cluster | - Read/write access to resources in a namespace \n - No read/write access to roles and role bindings< \n - Access the Kubernetes dashboard to view resources in a namespace. |
|
370 | 370 | | Manager role | When scoped to one namespace: **`admin`** cluster role applied by the **`ibm-operate`** role binding in that namespace \n \n When scoped to all namespaces: **`cluster-admin`** cluster role applied by the **`ibm-admin`** cluster role binding that applies to all namespaces | When scoped to one namespace: \n - Read/write access to all resources in a namespace but not to resource quota or the namespace itself \n - Create RBAC roles and role bindings in a namespace \n - Access the Kubernetes dashboard to view all resources in a namespace \n When scoped to all namespaces: \n - Read/write access to all resources in every namespace \n - Create RBAC roles and role bindings in a namespace or cluster roles and cluster role bindings in all namespaces \n - Access the Kubernetes dashboard \n - Create an Ingress resource that makes apps publicly available \n - Review cluster metrics such as with the `oc top pods`, `oc top nodes`, or `oc get nodes` commands |
|
371 | 371 | | Any service access role | All users of a {{site.data.keyword.redhat_openshift_notm}} cluster are given the `basic-users`. | | - Get basic information about projects that the user has access to. \n - Create authorized resources in the projects that the user has access to. \n - For more information, see the [{{site.data.keyword.redhat_openshift_notm}} docs](https://docs.openshift.com/container-platform/4.16/authentication/using-rbac.html){: external} |
|
372 |
| -{: caption="Table 1. Kubernetes resource permissions by service and corresponding RBAC roles" caption-side="bottom"} |
| 372 | +{: caption="Kubernetes resource permissions by service and corresponding RBAC roles" caption-side="bottom"} |
373 | 373 |
|
374 | 374 | ### Kubernetes resource permissions per RBAC role
|
375 | 375 | {: #rbac_ref}
|
@@ -436,7 +436,7 @@ The following table shows the permissions that are granted by each RBAC role to
|
436 | 436 | | `services/proxy` | - | create, delete, `deletecollection`, get, list, patch, update, watch | create, delete, `deletecollection`, get, list, patch, update, watch |
|
437 | 437 | | `statefulsets.apps` | get, list, watch | create, delete, `deletecollection`, get, list, patch, update, watch | create, delete, `deletecollection`, get, list, patch, update, watch |
|
438 | 438 | | `statefulsets.apps/scale` | get, list, watch | create, delete, `deletecollection`, get, list, patch, update, watch | create, delete, `deletecollection`, get, list, patch, update, watch |
|
439 |
| -{: caption="Table 1. Kubernetes resource permissions granted by each predefined RBAC role" caption-side="bottom"} |
| 439 | +{: caption="Kubernetes resource permissions granted by each predefined RBAC role" caption-side="bottom"} |
440 | 440 |
|
441 | 441 |
|
442 | 442 |
|
|
0 commit comments