Skip to content

Commit 0b04b3d

Browse files
bene2k1RoRoJ
andauthored
Apply suggestions from code review
Co-authored-by: Rowena Jones <[email protected]>
1 parent b1cc1fb commit 0b04b3d

File tree

2 files changed

+12
-12
lines changed

2 files changed

+12
-12
lines changed

menu/navigation.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2000,7 +2000,7 @@
20002000
"slug": "exposing-services"
20012001
},
20022002
{
2003-
"label": "Setting IAM permissions and implement RBAC on a cluster",
2003+
"label": "Setting IAM permissions and implementing RBAC on a cluster",
20042004
"slug": "set-iam-permissions-and-implement-rbac"
20052005
},
20062006
{

pages/kubernetes/reference-content/set-iam-permissions-and-implement-rbac.mdx

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
meta:
3-
title: Setting IAM permissions and implement RBAC on a cluster
3+
title: Setting IAM permissions and implementing RBAC on a cluster
44
description: This page explains how to set IAM permissions and implement RBAC on a Scaleway Kubernetes cluster
55
content:
6-
h1: Setting IAM permissions and implement RBAC on a cluster
6+
h1: Setting IAM permissions and implementing RBAC on a cluster
77
paragraph: This page explains how to set IAM permissions and implement RBAC on a Scaleway Kubernetes cluster
88
tags: kubernetes kapsule-cluser
99
dates:
@@ -14,15 +14,15 @@ categories:
1414
---
1515

1616
Role-based access control (RBAC) is a native feature of Kubernetes and a method of regulating access to compute or network resources based on the roles of individual users within your Organization.
17-
The feature is activated on Scaleway Kubernetes Kapsule and Kosmos by default and is compatible with Scaleway's IAM service.
18-
IAM and RBAC work together by integrating Scaleway’s Identity and Access Management with Kubernetes' native RBAC system. This integration ensures that access permissions are consistent across both the cloud infrastructure and the Kubernetes cluster, providing a secure access control mechanism.
17+
The feature is activated on Scaleway Kubernetes Kapsule and Kosmos by default and is compatible with Scaleway's Identity and Access Management (IAM) service.
18+
IAM and RBAC work together by integrating Scaleway’s IAM with Kubernetes' native RBAC system. This integration ensures that access permissions are consistent across both the cloud infrastructure and the Kubernetes cluster, providing a secure access control mechanism.
1919
It allows you to assign roles to users, groups or `ServicesAccount` via `RoleBindings` and `ClusterRoleBindings`.
2020

2121
Key components of RBAC in Kubernetes include:
2222

2323
- **Roles and ClusterRoles:**
24-
- `Roles`: These are specific to a namespace and define a set of permissions for resources within that namespace (e.g., pods, services).
25-
- `ClusterRoles`: These are similar to roles but apply cluster-wide, spanning across all namespaces.
24+
- `Roles`: These are specific to a namespace, and define a set of permissions for resources within that namespace (e.g., pods, services).
25+
- `ClusterRoles`: These are similar to roles but apply cluster-wide, spanning all namespaces.
2626
- **RoleBindings and ClusterRoleBindings:**
2727
- `RoleBindings`: These associate a set of permissions defined in a role with a user, group, or service account within a specific namespace.
2828
- `ClusterRoleBindings`: These associate a set of permissions defined in a ClusterRole with a user, group, or service account across the entire cluster.
@@ -77,7 +77,7 @@ Groups [scaleway:group:55eb7ac5-9afe-4e40-8d54-4fbb232cac21 scaleway:cluste
7777
- Note the group ID, as it will be needed later.
7878

7979
2. Create namespaces and roles:
80-
As a user/app with `KubernetesFullAccess` or `KubernetesSystemMastersGroupAccess`, create the following manifests:
80+
As a user or application with `KubernetesFullAccess` or `KubernetesSystemMastersGroupAccess`, create the following manifests:
8181

8282
Namespace creation:
8383

@@ -128,7 +128,7 @@ Groups [scaleway:group:55eb7ac5-9afe-4e40-8d54-4fbb232cac21 scaleway:cluste
128128
129129
Repeat the same operation for the staging namespace.
130130
131-
3. Apply the Manifests:
131+
3. Apply the manifests:
132132
```bash
133133
kubectl apply -f filename.yaml
134134
```
@@ -137,9 +137,9 @@ After these steps, members of the IAM group will have read access to the cluster
137137

138138
## Assigning permissions to a specific user without using a group
139139

140-
1. Assign the `KubernetesReadOnly` Permission Set to the User.
140+
1. Assign the `KubernetesReadOnly` Permission Set to the user.
141141
2. Retrieve the **IAM user ID** and note it.
142-
3. Create the following Manifests:
142+
3. Create the following manifests:
143143

144144
Namespace creation:
145145

@@ -191,7 +191,7 @@ After these steps, members of the IAM group will have read access to the cluster
191191

192192
The user "demo" now has full rights in the `example-sandbox` namespace.
193193

194-
## Limiting cluster-read Access
194+
## Limiting cluster-read access
195195

196196
To modify the `scaleway:cluster-read` permissions, use the following command:
197197

0 commit comments

Comments
 (0)