Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
H
helm3
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Commits
Issue Boards
Open sidebar
go
helm3
Commits
1c34db41
Unverified
Commit
1c34db41
authored
Nov 03, 2017
by
Matthew Fisher
Committed by
GitHub
Nov 03, 2017
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #3096 from venezia/add_helm_service_account_docs
Documentation on RBAC privileges needed for a helm client
parents
0647cdf8
62e2f140
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
59 additions
and
0 deletions
+59
-0
service_accounts.md
docs/service_accounts.md
+59
-0
No files found.
docs/service_accounts.md
View file @
1c34db41
...
...
@@ -110,3 +110,61 @@ NAME READY STATUS RESTARTS AGE
wayfaring-yak-alpine 0/1 ContainerCreating 0 0s
```
# Helm and Service Accounts
In order for a helm client to talk to a tiller, it will need certain privileges to be granted.
Specifically, the helm client will need to be able to
`create`
`pods/portforward`
and
be able to
`list`
`pods`
in the namespace where tiller is running.
## Example: Service account for a helm client
In this example, we will assume tiller is running in a namespace called
`tiller-world`
and that the helm client is running in a namespace called
`helm-world`
By default,
tiller is running in the
`kube-system`
namespace.
In
`helm-user.yaml`
:
```
yaml
apiVersion
:
v1
kind
:
ServiceAccount
metadata
:
name
:
helm-user-serviceaccount
namespace
:
helm-world
---
apiVersion
:
rbac.authorization.k8s.io/v1beta1
kind
:
Role
metadata
:
name
:
helm-user-role
namespace
:
tiller-world
rules
:
-
apiGroups
:
-
"
"
resources
:
-
pods/portforward
verbs
:
-
create
-
apiGroups
:
-
"
"
resources
:
-
pods
verbs
:
-
list
---
apiVersion
:
rbac.authorization.k8s.io/v1beta1
kind
:
RoleBinding
metadata
:
name
:
helm-user-role-binding
namespace
:
tiller-world
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
Role
name
:
helm-user-role
subjects
:
-
kind
:
ServiceAccount
name
:
helm-user-serviceaccount
namespace
:
helm-world
```
Please note that the
`role`
and
`rolebinding`
must be placed in the namespace
that tiller is running in, while the service account must be in the namespace
that the helm client is to be run in. (the pod using the helm client must
be using the service account created here)
\ No newline at end of file
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment