This repository contains yaml files that can be used to implement access control in GKE. 2 Roles are defined, the first one is for the CICD pipeline and is intended to be granted to GCP services such as Cloud Build. Therefore, we specify the GPC service account in the role binding. If you want to implement the CICD pipeline by Jenkins or other services as Pods, please specify the Kubernetes service account. This role is created from "editor" of the cluster role. The other is the role for the security auditor. This is created based on the "view" of the cluster role, and the permissions of view roles and role bindings are added.
How to use these sample yaml filesgke-rbac-best-practices
.<>
to suit your environment in RoleBinding files.git clone https://github.com/GoogleCloudPlatform/gke-rbac-best-practices cd gke-rbac-best-practices vi cicd-rolebinding.yaml or security-auditor-rolebinding.yaml kubectl apply -f your yaml file
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4