mirror of https://github.com/docker/docs.git
Move Kube rbac limitations notes (#443)
This commit is contained in:
parent
da544055a5
commit
d1fdbb84c3
|
|
@ -109,4 +109,22 @@ UCP web UI.
|
|||
|
||||
User "jane" has access to inspect pods in the `default` namespace.
|
||||
|
||||
## Kubernetes limitations
|
||||
|
||||
There are a few limitations that you should be aware of when creating
|
||||
Kubernetes workloads:
|
||||
|
||||
* Docker EE has its own RBAC system, so it's not possible to create
|
||||
`ClusterRole` objects, `ClusterRoleBinding` objects, or any other object that is
|
||||
created by using the `/apis/rbac.authorization.k8s.io` endpoints.
|
||||
* To make sure your cluster is secure, only admin users can deploy pods with
|
||||
privileged options. These are options like `PodSpec.hostIPC`, `PodSpec.hostNetwork`,
|
||||
`PodSpec.hostPID`, `SecurityContext.allowPrivilegeEscalation`,
|
||||
`SecurityContext.capabilities`, `SecurityContext.privileged`, and
|
||||
`Volume.hostPath`.
|
||||
* You can't grant permissions to Kubernetes service accounts.
|
||||
The `default` service account has no permissions and can't use the Kubernetes
|
||||
API. All other service accounts have full admin permissions and can only be
|
||||
used by Docker EE administrators.
|
||||
|
||||
{% endif %}
|
||||
|
|
@ -261,23 +261,5 @@ You should see the currently running image:
|
|||
Image: nginx:1.8
|
||||
```
|
||||
|
||||
## Kubernetes limitations
|
||||
|
||||
There are a few limitations that you should be aware of when creating
|
||||
Kubernetes workloads:
|
||||
|
||||
* Docker EE has its own RBAC system, so it's not possible to create
|
||||
ClusterRole objects, ClusterRoleBinding objects, or any other object that is
|
||||
created using the `/apis/rbac.authorization.k8s.io` endpoints.
|
||||
* To make sure your cluster is secure, only admin users can deploy Pods with
|
||||
privileged options. These are options like `PodSpec.hostIPC`, `PodSpec.hostNetwork`,
|
||||
`PodSpec.hostPID`, `SecurityContext.allowPrivilegeEscalation`,
|
||||
`SecurityContext.capabilities`, `SecurityContext.privileged`, and
|
||||
`Volume.hostPath`.
|
||||
* You can't grant permissions to Kubernetes service accounts.
|
||||
The `default` service account has no permissions and cannot use the Kubernetes
|
||||
API. All other service accounts have full admin permissions and can only be
|
||||
used by Docker EE administrators.
|
||||
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
|
|
|
|||
Loading…
Reference in New Issue