Skip to content

Commit 9885164

Browse files
authored
Merge pull request #21046 from divyabhushan/master
Rendering issues on#service-account-permissions #21029
2 parents 782ff1b + 6595ea6 commit 9885164

File tree

1 file changed

+25
-25
lines changed
  • content/en/docs/reference/access-authn-authz

1 file changed

+25
-25
lines changed

content/en/docs/reference/access-authn-authz/rbac.md

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1079,37 +1079,37 @@ In order from most secure to least secure, the approaches are:
10791079

10801080
2. Grant a role to the "default" service account in a namespace
10811081

1082-
If an application does not specify a `serviceAccountName`, it uses the "default" service account.
1082+
If an application does not specify a `serviceAccountName`, it uses the "default" service account.
10831083

1084-
{{< note >}}
1085-
Permissions given to the "default" service account are available to any pod
1086-
in the namespace that does not specify a `serviceAccountName`.
1087-
{{< /note >}}
1084+
{{< note >}}
1085+
Permissions given to the "default" service account are available to any pod
1086+
in the namespace that does not specify a `serviceAccountName`.
1087+
{{< /note >}}
10881088

1089-
For example, grant read-only permission within "my-namespace" to the "default" service account:
1089+
For example, grant read-only permission within "my-namespace" to the "default" service account:
10901090

1091-
```shell
1092-
kubectl create rolebinding default-view \
1093-
--clusterrole=view \
1094-
--serviceaccount=my-namespace:default \
1095-
--namespace=my-namespace
1096-
```
1091+
```shell
1092+
kubectl create rolebinding default-view \
1093+
--clusterrole=view \
1094+
--serviceaccount=my-namespace:default \
1095+
--namespace=my-namespace
1096+
```
10971097

1098-
Many [add-ons](/docs/concepts/cluster-administration/addons/) run as the
1099-
"default" service account in the `kube-system` namespace.
1100-
To allow those add-ons to run with super-user access, grant cluster-admin
1101-
permissions to the "default" service account in the `kube-system` namespace.
1098+
Many [add-ons](/docs/concepts/cluster-administration/addons/) run as the
1099+
"default" service account in the `kube-system` namespace.
1100+
To allow those add-ons to run with super-user access, grant cluster-admin
1101+
permissions to the "default" service account in the `kube-system` namespace.
11021102

1103-
{{< caution >}}
1104-
Enabling this means the `kube-system` namespace contains Secrets
1105-
that grant super-user access to your cluster's API.
1106-
{{< /caution >}}
1103+
{{< caution >}}
1104+
Enabling this means the `kube-system` namespace contains Secrets
1105+
that grant super-user access to your cluster's API.
1106+
{{< /caution >}}
11071107

1108-
```shell
1109-
kubectl create clusterrolebinding add-on-cluster-admin \
1110-
--clusterrole=cluster-admin \
1111-
--serviceaccount=kube-system:default
1112-
```
1108+
```shell
1109+
kubectl create clusterrolebinding add-on-cluster-admin \
1110+
--clusterrole=cluster-admin \
1111+
--serviceaccount=kube-system:default
1112+
```
11131113

11141114
3. Grant a role to all service accounts in a namespace
11151115

0 commit comments

Comments
 (0)