Combining Role Bindings with Namespaces
In this lesson, first, we will combine Role Bindings with Namespaces and then create a user-specific Namespace.
The Solution
The new request demanding more freedom provides an excellent opportunity to combine Namespaces with Role Bindings.
We can create a dev Namespace and allow a selected group of users to do almost anything in it. That should give developers enough freedom within the dev Namespace while avoiding the risks of negatively impacting the resources running in others.
Looking into the Definition
Let’s take a look at the auth/rb-dev.yml definition.
cat auth/rb-dev.yml
The output is as follows.
apiVersion: v1kind: Namespacemetadata:name: dev---apiVersion: rbac.authorization.k8s.io/v1kind: RoleBindingmetadata:name: devnamespace: devsubjects:- kind: Username: jdoeapiGroup: rbac.authorization.k8s.ioroleRef:kind: ClusterRolename: adminapiGroup: rbac.authorization.k8s.io
Line 1-4: The first section defines the dev Namespace.
Line 8-20: The second section specifies the binding with the same name. Since we’re using RoleBinding (not ClusterRoleBinding), the effects will ...
Access this course and 1600+ top-rated courses and projects.