You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/kubernetes/reference-content/set-iam-permissions-and-implement-rbac.mdx
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,9 @@
1
1
---
2
2
meta:
3
-
title: Setting IAM permissions and implement RBAC on a cluster
3
+
title: Setting IAM permissions and implementing RBAC on a cluster
4
4
description: This page explains how to set IAM permissions and implement RBAC on a Scaleway Kubernetes cluster
5
5
content:
6
-
h1: Setting IAM permissions and implement RBAC on a cluster
6
+
h1: Setting IAM permissions and implementing RBAC on a cluster
7
7
paragraph: This page explains how to set IAM permissions and implement RBAC on a Scaleway Kubernetes cluster
8
8
tags: kubernetes kapsule-cluser
9
9
dates:
@@ -14,15 +14,15 @@ categories:
14
14
---
15
15
16
16
Role-based access control (RBAC) is a native feature of Kubernetes and a method of regulating access to compute or network resources based on the roles of individual users within your Organization.
17
-
The feature is activated on Scaleway Kubernetes Kapsule and Kosmos by default and is compatible with Scaleway's IAM service.
18
-
IAM and RBAC work together by integrating Scaleway’s Identity and Access Management with Kubernetes' native RBAC system. This integration ensures that access permissions are consistent across both the cloud infrastructure and the Kubernetes cluster, providing a secure access control mechanism.
17
+
The feature is activated on Scaleway Kubernetes Kapsule and Kosmos by default and is compatible with Scaleway's Identity and Access Management (IAM) service.
18
+
IAM and RBAC work together by integrating Scaleway’s IAM with Kubernetes' native RBAC system. This integration ensures that access permissions are consistent across both the cloud infrastructure and the Kubernetes cluster, providing a secure access control mechanism.
19
19
It allows you to assign roles to users, groups or `ServicesAccount` via `RoleBindings` and `ClusterRoleBindings`.
20
20
21
21
Key components of RBAC in Kubernetes include:
22
22
23
23
-**Roles and ClusterRoles:**
24
-
-`Roles`: These are specific to a namespace and define a set of permissions for resources within that namespace (e.g., pods, services).
25
-
-`ClusterRoles`: These are similar to roles but apply cluster-wide, spanning across all namespaces.
24
+
-`Roles`: These are specific to a namespace, and define a set of permissions for resources within that namespace (e.g., pods, services).
25
+
-`ClusterRoles`: These are similar to roles but apply cluster-wide, spanning all namespaces.
26
26
-**RoleBindings and ClusterRoleBindings:**
27
27
-`RoleBindings`: These associate a set of permissions defined in a role with a user, group, or service account within a specific namespace.
28
28
-`ClusterRoleBindings`: These associate a set of permissions defined in a ClusterRole with a user, group, or service account across the entire cluster.
@@ -77,7 +77,7 @@ Groups [scaleway:group:55eb7ac5-9afe-4e40-8d54-4fbb232cac21 scaleway:cluste
77
77
- Note the group ID, as it will be needed later.
78
78
79
79
2. Create namespaces and roles:
80
-
As a user/app with `KubernetesFullAccess` or `KubernetesSystemMastersGroupAccess`, create the following manifests:
80
+
As a user or application with `KubernetesFullAccess` or `KubernetesSystemMastersGroupAccess`, create the following manifests:
81
81
82
82
Namespace creation:
83
83
@@ -128,7 +128,7 @@ Groups [scaleway:group:55eb7ac5-9afe-4e40-8d54-4fbb232cac21 scaleway:cluste
128
128
129
129
Repeat the same operation for the staging namespace.
130
130
131
-
3. Apply the Manifests:
131
+
3. Apply the manifests:
132
132
```bash
133
133
kubectl apply -f filename.yaml
134
134
```
@@ -137,9 +137,9 @@ After these steps, members of the IAM group will have read access to the cluster
137
137
138
138
## Assigning permissions to a specific user without using a group
139
139
140
-
1. Assign the `KubernetesReadOnly` Permission Set to the User.
140
+
1. Assign the `KubernetesReadOnly` Permission Set to the user.
141
141
2. Retrieve the **IAM user ID** and note it.
142
-
3. Create the following Manifests:
142
+
3. Create the following manifests:
143
143
144
144
Namespace creation:
145
145
@@ -191,7 +191,7 @@ After these steps, members of the IAM group will have read access to the cluster
191
191
192
192
The user "demo" now has full rights in the `example-sandbox` namespace.
193
193
194
-
## Limiting cluster-read Access
194
+
## Limiting cluster-read access
195
195
196
196
To modify the `scaleway:cluster-read` permissions, use the following command:
0 commit comments