Kubernetes dashboard
Configure Access to the embedded Kubernetes Dashboard
Introduction
Your Plural console comes with a fully embedded Kubernetes dashboard. This is meant to solve for a few things:
- Simplifying kubernetes API access: No need to juggle kubeconfigs, VPNs, etc to understand your k8s. It also connects directly to your OIDC so it will leverage an approved auth flow.
- Simplify networking: all traffic to managed clusters use the same unidirectional egress networking coming from the Plural agent as is done with deployments. That way you can retain visibility into private clusters and on-prem clusters.
- Better UI: you'll get all the benefits of Plural's UI/UX in your kubernetes dashboard experience.
RBAC
The dashboard ultimately uses Kubernetes Impersonation to authenticate to kubernetes using your Console identity. That means all rbac resolves to your console user email and groups, which are themselves connected to your identity provider. On net this should give you an effective kubernetes SSO experience.
To create RBAC rules for your console user, you'd use something like:
yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: sre-binding roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: sre
To grant the cluster-admin
role to all users within the sre
group. Or alternatively:
yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: someones-binding roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: someone@your.company.com
To grant the same role just to the someone@your.company.com
user email.