Skip to content

Commit fa08071

Browse files
committed
docs(k8s): update docs rbac
1 parent dd5ae74 commit fa08071

File tree

2 files changed

+24
-16
lines changed

2 files changed

+24
-16
lines changed

pages/kubernetes/how-to/connect-cluster-kubectl.mdx

Lines changed: 4 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -34,23 +34,11 @@ If your Organization uses IAM to control access, ensure that you or your group/a
3434
- `KubernetesFullAccess` (or `KubernetesReadOnly`, depending on your needs):
3535
Grants you the ability to manage (or list/read) Kubernetes clusters, nodes, and related actions in your Scaleway Project.
3636

37-
To create a new policy with the correct permission sets, follow these steps:
38-
39-
### Configure an IAM policy
40-
41-
1. **Create a new policy**: Navigate to the **Policies** tab in your Organization’s IAM console and create a new policy.
42-
2. **Add your user (or group/application)**: Assign your user, group, or application as the **Principal**.
43-
3. **Add an IAM rule**:
44-
- **Scope**: Set to **Access to resources** and specify the desired Project(s).
45-
- **Permission Sets**: Include the following as needed:
46-
- `KubernetesFullAccess` for full cluster management.
47-
- `KubernetesReadOnly` for read-only access.
48-
4. Click **Validate** and then **Create Policy**.
49-
<Message type="tip">
50-
- Refer to our [policy and permission sets documentation](/iam/reference-content/permission-sets/) for more details.
51-
- Scaleway may **automatically generate IAM resources**, such as applications, groups and policies. Refer to [auto-generated IAM resources](/iam/reference-content/auto-generated-iam-resources/) for further information.
52-
</Message>
37+
<Message type="tip">
38+
If you do not have setup IAM for your account yet, you can generate a `kubeconfig` file with IAM after cluster creation from the Scaleway console.
39+
</Message>
5340

41+
For detailed information about the configuration of IAM policies for your Kubernetes clusters, refer to our dedicated documentation [Setting IAM permissions and implementing RBAC on a cluster](/kubernetes/reference-content/set-iam-permissions-and-and-implement-rbac/).
5442
## Accessing the cluster
5543

5644
You can use the Scaleway CLI to automatically retrieve (and merge) your `kubeconfig` file, then interact with your Kubernetes cluster.

pages/kubernetes/reference-content/set-iam-permissions-and-implement-rbac.mdx

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,26 @@ An [IAM policy](/iam/concepts/#policy) defines the permissions for users, groups
3535

3636
The combination of IAM and Kubernetes RBAC allows you to define fine-grained access levels for cluster users.
3737

38+
<Message type="tip">
39+
For more information how to download and use the `kubeconfig` file with IAM permissions, refer to [How to connect to a Kubernetes Kapsule cluster with kubectl](/kubernetes/how-to/connect-cluster-kubectl/).
40+
</Message>
41+
42+
### Configuring an IAM policy
43+
44+
To create a new policy with the correct permission sets using the [Scaleway console](https://console.scaleway.com/), follow these steps:
45+
46+
1. **Create a new policy**: Navigate to the **Policies** tab in your Organization’s IAM console and create a new policy.
47+
2. **Add your user (or group/application)**: Assign your user, group, or application as the **Principal**.
48+
3. **Add an IAM rule**:
49+
- **Scope**: Set to **Access to resources** and specify the desired Project(s).
50+
- **Permission Sets**: Include the following as needed:
51+
- `KubernetesFullAccess` for full cluster management.
52+
- `KubernetesReadOnly` for read-only access.
53+
4. Click **Validate** and then **Create Policy**.
54+
<Message type="tip">
55+
- Refer to our [policy and permission sets documentation](/iam/reference-content/permission-sets/) for more details.
56+
- Scaleway may **automatically generate IAM resources**, such as applications, groups and policies. Refer to [auto-generated IAM resources](/iam/reference-content/auto-generated-iam-resources/) for further information.
57+
</Message>
3858

3959
### Mapping IAM permission sets to Kubernetes groups
4060

0 commit comments

Comments
 (0)