Replies: 1 comment 3 replies
-
|
Cryostat's user access model, assuming you use Cryostat in OpenShift with the openshift-oauth-proxy enabled (ie you use the Operator, or you enable this feature with the Helm chart):
In your case, you can install Cryostat A into Namespace A, and set its list of Target Namespaces to simply [A]. Then, ensure that your A team members have the You can customize this role using the Cryostat CRD property: or Helm chart values: in case |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi, I wonder how user access is/could be resolved in cryostat.
Lest say we have three namespaces A, B, C. Namespaces are managed by different teams. I want to gave possibility to start/stop recording for pods in namespace A only for tam members managing that namespace.
Currently we have RBAS (in kubernetes) set up in the way that only team member can i.e.
exec/port-forwardin given namespace.I wonder what is cryostat recommended to make it work ?
Beta Was this translation helpful? Give feedback.
All reactions