-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Services need fine-grained permissions #8723
Comments
#8655 is about NodePort, which is one of the sensitive values. |
#7893 is about SecurityContextConstraints. |
Another reason for an ACL mechanism for LoadBalancer: it typically costs money (~ $20 for 5 rules on GCE, $15 each LB on AWS), and you typically can't create very many per cloud account (on AWS, the default limit is 20 per region). |
We can quota usage of both load balancers and node ports in a namespace to On Wednesday, May 25, 2016, Brian Grant notifications@github.com wrote:
|
@erictune - an example doing this with quota:
You can set either to 0 to prevent consumption of either. This is new to kube 1.3 - thanks to @sdminonne |
yep, @derekwaynecarr not sure if I've to do something for release notes on #24247 and #22154 |
You should be fine. Both are labeled release note. On Thursday, May 26, 2016, Dario Minonne notifications@github.com wrote:
|
thanks |
Quota seems good for nodePort. For LoadBalancer, I was hoping we could express this via RBAC. Some roles can expose things to the internets, and some can't. |
For now quota handles this pretty effectively. |
quota and admission webhooks cover this for now |
We may want to let users create services, but not let them use all the possible options.
For Pods we have a proposal to make a SecurityConstraint that controls some security sensitive fields which are grouped into a SecurityContext. Does this pattern apply to service as well in some way?
Sometimes we want to let a principal create pods, but not allow them to use all the possible options on pods. One way we are looking at doing this is to group some sensitive options
The text was updated successfully, but these errors were encountered: