Namespaces and RBAC
Introduction
Table of Contents
Understanding Namespaces
Why Namespaces Matter
Default Namespaces
Namespace Basics
Creating Namespaces
Working with Namespaces
Deploying Resources to Namespaces
Introduction to RBAC
RBAC Architecture
RBAC Components
Checking RBAC Permissions
Roles and ClusterRoles
Role (Namespace-scoped)
ClusterRole (Cluster-wide)
Aggregated ClusterRoles
RoleBindings and ClusterRoleBindings
RoleBinding
ClusterRoleBinding
Service Accounts
Creating Service Accounts
Using Service Accounts in Pods
Disable Automounting Token
Multi-Tenancy Patterns
Namespace-per-Team
Namespace-per-Environment
Cross-Namespace Access
Resource Quotas and Limit Ranges
Resource Quotas
Limit Ranges
Network Policies for Isolation
Security Best Practices
1. Principle of Least Privilege
2. Use Service Accounts for Pods
3. Namespace Isolation
4. Audit RBAC Regularly
5. Use ResourceNames for Fine-Grained Control
Troubleshooting Access Issues
Permission Denied Errors
Service Account Issues
Debugging RBAC with impersonation
Advanced RBAC Patterns
Dynamic Admission Control
Attribute-Based Access Control (ABAC) Alternative
Hierarchical Namespaces
What I Learned
Last updated