© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
S. SubramanianDeploy Container Applications Using Kuberneteshttps://doi.org/10.1007/978-1-4842-9277-8_11

11. Kubernetes RBAC

Shiva Subramanian1  
Georgia, GA, USA

In this chapter, we will learn about the Role-Based Access Control capabilities that Kubernetes offers so that we can grant access to various types of business and technical users to the clusters with permissions based on the concept of least privilege to get their job done.

Let us assume we have three classes of users, namely, (1) K8S administrators; (2) DevOps users that will need some but not admin access to the cluster, perhaps to deploy applications and monitor them; and (3) read-only users ...

Get Deploy Container Applications Using Kubernetes: Implementations with microk8s and AWS EKS now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.