Honor the principle of least privilege for CNCF deployment

Instead of giving a lot of permissions set only the needed ones
This commit is contained in:
Néstor Salceda 2018-11-09 17:45:30 +01:00
parent 4696519deb
commit 1da02bf3ff
2 changed files with 5 additions and 3 deletions

View File

@ -1,10 +1,11 @@
deploy:
kubectl apply -f nats/
kubectl apply -f kubeless/
kubectl apply -f network-policy.yaml
kubectl apply -f ../cluster-role.yaml
kubectl apply -f .
clean:
kubectl delete -f kubeless/
kubectl delete -f nats/
kubectl delete -f .
kubectl delete -f ../cluster-role.yaml

View File

@ -1,12 +1,13 @@
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: sysdig-kubeless
name: kubernetes-response-engine-cluster-role-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cluster-admin
name: kubernetes-response-engine-cluster-role
subjects:
- kind: ServiceAccount
name: default
namespace: default
apiGroup: rbac.authorization.k8s.io