Berechtigungen
Hier finden Sie eine Auflistung aller Berechtigungen in der Informatik Compute Cloud. Es wird zwischen Namespace/Space-gebundenen und clusterweiten API-Ressourcen unterschieden.
Namespace Scope
RESOURCE | LIST | CREATE | UPDATE | DELETE |
---|---|---|---|---|
bindings | yes | yes | yes | yes |
certificaterequests.cert-manager.io | yes | no | no | no |
certificates.cert-manager.io | yes | no | no | no |
challenges.acme.cert-manager.io | no | no | no | no |
configmaps | yes | yes | yes | yes |
controllerrevisions.apps | yes | no | no | no |
cronjobs.batch | yes | yes | yes | yes |
daemonsets.apps | no | no | no | no |
deployments.apps | yes | yes | yes | yes |
endpoints | yes | no | no | no |
endpointslices.discovery.k8s.io | no | no | no | no |
events | yes | no | no | no |
events.events.k8s.io | yes | no | no | no |
horizontalpodautoscalers.autoscaling | yes | yes | yes | yes |
ingresses.extensions | yes | yes | yes | yes |
ingresses.networking.k8s.io | yes | yes | yes | yes |
jobs.batch | yes | yes | yes | yes |
leases.coordination.k8s.io | no | no | no | no |
limitranges | yes | no | no | no |
localsubjectaccessreviews.authorization.k8s.io | no | no | no | no |
orders.acme.cert-manager.io | no | no | no | no |
persistentvolumeclaims | yes | yes | yes | yes |
pods | yes | yes | yes | yes |
podtemplates | no | no | no | no |
replicasets.apps | yes | yes | yes | yes |
replicationcontrollers | yes | yes | yes | yes |
resourcequotas | yes | no | no | no |
rolebindings.rbac.authorization.k8s.io | yes | yes | yes | yes |
roles.rbac.authorization.k8s.io | yes | yes | yes | yes |
secrets | yes | yes | yes | yes |
serviceaccounts | yes | yes | yes | yes |
services | yes | yes | yes | yes |
statefulsets.apps | yes | yes | yes | yes |
volumesnapshots.snapshot.storage.k8s.io | no | no | no | no |
Cluster Scope
Das Erstellen von API-Ressourcen auf Clusterebene wie z.B. ClusterRoles
, ClusterRoleBindings
, ..., ist nicht möglich!