Skip to content
Due to upgrade issues with the Envoy gateway and the offline installation environments, upgrading to MKE 4k 4.1.3 is not recommended. These issues are fixed in the 4.1.4 release. For version 4.1.3, Mirantis only supports fresh installations.

Permissions#

Permissions specify which interactions are allowed within the cluster. Once created, these permissions can be bound to a team or organization in order to apply them to the users or groups within the team or organization.

A number of default user-facing permissions are provided within MKE 4k, offering common sets with which you can set up a cluster quickly and securely. In addition, you can create your own custom permissions.

Default permissions#

The permissions that make up the MKE 4k default permissions can be applied directly to particular roles that are used create custom permissions.

Permission Description
cluster-admin Enables super user access to perform an action on the cluster.
admin Enables admin access within a namespace.
edit Enables read/write access to most objects within a namespace.
view Enables read-only access that allows you to see more objects within a namespace.

For detail on the default permissions that Kubernetes offers, refer to the official Kubernetes documentation Using RBAC Authorization: User--facing roles.

Custom permissions#

MKE 4k admins can create custom permissions that are fine-tuned for a precise set of needs. Such permissions can consist of other permissions or individual rules on a per object and per permission basis. You can set the scope of custom permissions, configuring them to apply to the entire cluster or to a specific namespace within the cluster.

To create custom permissions:

You generate custom permissions by creating a Kubernetes ClusterRole or Kubernetes Role object, which you can do either through the command line or by way of the MKE 4k Dashboard.

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  # "namespace" omitted since ClusterRoles are not namespaced
  name: secret-reader
rules:
  - apiGroups: [""]
    resources: ["secrets"]
    verbs: ["get", "watch", "list"]