DevOps Articles

Curated articles, resources, tips and trends from the DevOps World.

7 Expert Strategies for Managing RBAC on OpenShift

2 years ago thenewstack.io

Summary: This is a summary of an article originally published by The New Stack. Read the full original article here →

With the rise of containerization and cloud-based computing, securing infrastructure and managing fine-grained access control can be a significant challenge for organizations using https://www.openshift.com/try?utm_content=inline-mention This platform provides a vast array of tools and features, but maintaining tight security standards means managing access and permissions at a granular level. Authorization in OpenShift is managed using role-based access control (RBAC).

The role only has access to the get, watch and list verbs for the pods and services resources.

Here’s another example: kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: name: admin-role namespace: dev rules: - apiGroups: [""] resources: ["pods", "services", "replicationcontrollers", "configmaps", "secrets"] verbs: ["get", "watch", "list", "create", "update", "delete"]

In this example, the pod-reader role has get, watch and list permissions on the pods resource in the my-namespace namespace.

Made with pure grit © 2024 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com