To ensure security and compliance, it's important to assign the least privileges necessary for Rubrik to perform its tasks. This repository provides Kubernetes ClusterRole and Role definitions that encapsulate these permissions for utilizing Rubrik Kubernetes Protection.
Follow the instructions in the Documentation for configuring the required permissions.
-
rubrik-kubeconfig-cluster-role-for-openshift: ClusterRole with permissions required at a cluster level for the Rubrik Kubeconfig User on Redhat Openshift Clusters.
-
rubrik-kubeconfig-cluster-role: ClusterRole with permissions required at a cluster level for the Rubrik Kubeconfig User on all other Kubernetes Clusters.
-
rubrik-backup-recovery-cluster-role: ClusterRole with permissions on all resources to perform backup and recovery for the Rubrik Kubeconfig User.
-
rubrik-kubeconfig-role: Role with permissions required in the
rubrik-kupr
namespace for the Rubrik Kubeconfig User.
Create the required ClusterRoles, Roles and their corresponding ClusterRoleBindings, RoleBindings with the Rubrik Kubeconfig User. The Kubeconfig for this User can be used to add the Kubernetes cluster to RSC.
We glady welcome contributions from the community. From updating the documentation to requesting additional Role, ClusterRole definitions, all ideas are welcome. Thank you in advance for all of your issues, pull requests, and comments! ⭐
We encourage all contributors to become members. We aim to grow an active, healthy community of contributors, reviewers, and code owners. Learn more in our Welcome to the Rubrik Build Community page.
We'd love to hear from you! Email us: [email protected] 💌