Automated commit at Mon Apr 1 10:30:00 CEST 2024

This commit is contained in:
Mischa van den Burg 2024-04-01 10:30:00 +02:00
parent 0ce881b120
commit eea2720647
5 changed files with 42 additions and 1 deletions

View File

@ -0,0 +1,13 @@
A ClusterRole is available to the entire cluster. But you will only receive these permissions in all namespaces if a **Cluster**Rolebinding is created.
You can also create a normal RoleBinding, which is a namespaced resource. Then the permissions will only apply to that namespace, even though it is a ClusterRole.
You can also have RoleBindings from multiple namespaces and the ClusterRole will only apply to those namespaces.
## Links:
202404011016

View File

@ -2,11 +2,12 @@
[[CKS]]
[[Kubernetes Storage]]
[[Network Policies]]
[[RBAC]]
## Links:

View File

@ -0,0 +1,7 @@
Permissions from ClusterRolebindings and RoleBindings will be added to each other.
## Links:
202404011021

12
content/RBAC.md Normal file
View File

@ -0,0 +1,12 @@
[[There are no Deny rules in Kubernetes RBAC]]
[[ClusterRoles can be applied to one or more namespaces]]
[[RBAC permissions are additive]]
## Links:
202404011006

View File

@ -0,0 +1,8 @@
It is only possible to allow permissions in Kubernetes. You can only whitelist.
## Links:
202404011006