简体   繁体   English

Azure Kubernetes - 用于命名空间隔离的 RBAC 角色

[英]Azure Kubernetes - RBAC role for namespace isolation

i would like to know if is possible to isolate namespace on Azure Kubernetes service.我想知道是否可以在 Azure Kubernetes 服务上隔离命名空间。 Now if i give rbac role to my colleague they can see all namespace, i would like to segregate namespace for department, eg data can see only data namespace, dev can see only den namespace etc..现在,如果我给我的同事 rbac 角色,他们可以看到所有命名空间,我想为部门隔离命名空间,例如数据只能看到数据命名空间,开发人员只能看到 den 命名空间等。

is it possible?是否可以?

Thanks谢谢

yes, You have to Enable AKS-managed Azure Active Directory , Role-based access control (RBAC) & Azure RBAC for Kubernetes Authorization .是的,您必须为 Kubernetes 授权启用AKS-managed Azure Active DirectoryRole-based access control (RBAC)Azure RBAC There are 2 options:有2个选项:

az aks create -g myResourceGroup -n myManagedCluster --enable-aad --enable-azure-rbac

1st Option:第一个选项:

---
apiVersion: v1
kind: Namespace
metadata:
  name: data
  labels:
    kubernetes.io/metadata.name: data
---
kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: data-view-access
  namespace: data
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: view
subjects:
- kind: Group
  namespace: data
  name: <GROUP_OBJECT_ID>

2nd Option is to use Azure Custom Roles as explained here .第二个选项是讲解了使用Azure的自定义角色在这里

NOTE: All users must be member of Azure Kubernetes Service Cluster User Role in order the execute az aks get-credentials注意:所有用户必须是Azure Kubernetes Service Cluster User Role的成员才能执行az aks get-credentials

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM