Skip to content

Commit

Permalink
(from getambassador.io) Removing bogus whitespace and "ugly" links.
Browse files Browse the repository at this point in the history
  • Loading branch information
khussey committed Apr 28, 2021
1 parent 08711da commit ca3d859
Showing 1 changed file with 20 additions and 21 deletions.
41 changes: 20 additions & 21 deletions reference/rbac.md
Original file line number Diff line number Diff line change
@@ -1,23 +1,22 @@
import Alert from '@material-ui/lab/Alert';

# Telepresence RBAC
The intention of this document is to provide a template for securing and limiting the permissions of Telepresence 2.
This documentation will not cover the full extent of permissions necessary to administrate Telepresence 2 components in a cluster. [Telepresence administration](https://www.getambassador.io/products/telepresence/) requires permissions for creating Service Accounts, ClusterRoles and ClusterRoleBindings, and for creating the `traffic-manager` [deployment](../architecture/#traffic-manager) which is typically done by a full cluster administrator.
This documentation will not cover the full extent of permissions necessary to administrate Telepresence 2 components in a cluster. [Telepresence administration](/products/telepresence/) requires permissions for creating Service Accounts, ClusterRoles and ClusterRoleBindings, and for creating the `traffic-manager` [deployment](../architecture/#traffic-manager) which is typically done by a full cluster administrator.

There are 2 general categories for cluster permissions with respect to Telepresence 2. There are RBAC settings for a User and for an Administrator described above. The User is expected to only have the minimum cluster permissions necessary to create a Telepresence [intercept](../../howtos/intercepts/), and otherwise be unable to affect Kubernetes resources.

In addition to the above, there is also a consideration of how to manage Users and Groups in Kubernetes which is outside of the scope of the document. This document will use Service Accounts to assign Roles and Bindings. Other methods of RBAC administration and enforcement can be found on the Kubernetes documentation found [here](https://kubernetes.io/docs/reference/access-authn-authz/rbac/)

## Requirements

- Kubernetes version 1.16+
- Cluster admin privileges to apply RBAC

## Editing your Kubeconfig
This guide also assumes that you are utilizing a Kubeconfig file that is specified by the `KUBECONFIG` environment variable. This is a `yaml` file that contains the cluster's API endpoint information as well as the user data being supplied for authentication. The Service Account name used in the example below is called tp2-user. This can be replaced by any value (i.e. John or Jane) as long as references to the Service Account are consistent throughout the `yaml`. After an administrator has applied the RBAC configuration, a user should create a `config.yaml` in your current directory that looks like the following:

This guide also assumes that you are utilizing a Kubeconfig file that is specified by the `KUBECONFIG` environment variable. This is a `yaml` file that contains the cluster's API endpoint information as well as the user data being supplied for authentication. The Service Account name used in the example below is called tp2-user. This can be replaced by any value (i.e. John or Jane) as long as references to the Service Account are consistent throughout the `yaml`. After an administrator has applied the RBAC configuration, a user should create a `config.yaml` in your current directory that looks like the following:

```yaml
apiVersion: v1
kind: Config
Expand All @@ -35,17 +34,17 @@ users:
user:
token: <service-account-token> # See note below
```
The Service Account token will be obtained by the cluster administrator after they create the user's Service Account. Creating the Service Account will create an associated Secret in the same namespace with the format `<service-account-name>-token-<uuid>`. This token can be obtained by your cluster administrator by running `kubectl get secret -n ambassador <service-account-secret-name> -o jsonpath='{.data.token}' | base64 -d`.

After creating `config.yaml` in your current directory, export the file's location to KUBECONFIG by running `export KUBECONFIG=$(pwd)/config.yaml`. You should then be able to switch to this context by running `kubectl config use-context my-context`.

## Cluster-Wide Telepresence User Access

To allow users to make intercepts across all namespaces, but with more limited `kubectl` permissions, the following `ServiceAccount`, `ClusterRole`, and `ClusterRoleBinding` will allow full `telepresence intercept` functionality.

<Alert severity="warning">The following RBAC configurations assume that there is already a Traffic Manager deployment set up by a Cluster Administrator</Alert>

```yaml
---
apiVersion: v1
Expand Down Expand Up @@ -101,13 +100,13 @@ roleRef:
name: telepresence-role
kind: ClusterRole
```

## Namespace Only Telepresence User Access

RBAC for multi-tenant scenarios where multiple dev teams are sharing a single cluster where users are constrained to a specific namespace(s).

<Alert severity="warning">The following RBAC configurations assume that there is already a Traffic Manager deployment set up by a Cluster Administrator</Alert>

```yaml
---
apiVersion: v1
Expand Down

0 comments on commit ca3d859

Please sign in to comment.