Merge pull request #25856 from edwardrosen/patch-1

Update rbac.md
pull/26070/head
Kubernetes Prow Robot 2021-01-12 16:00:36 -08:00 committed by GitHub
commit 2135ed8002
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 1 additions and 1 deletions

View File

@ -87,7 +87,7 @@ Because ClusterRoles are cluster-scoped, you can also use them to grant access t
* non-resource endpoints (like `/healthz`) * non-resource endpoints (like `/healthz`)
* namespaced resources (like Pods), across all namespaces * namespaced resources (like Pods), across all namespaces
For example: you can use a ClusterRole to allow a particular user to run For example: you can use a ClusterRole to allow a particular user to run
`kubectl get pods --all-namespaces`. `kubectl get pods --all-namespaces`
Here is an example of a ClusterRole that can be used to grant read access to Here is an example of a ClusterRole that can be used to grant read access to
{{< glossary_tooltip text="secrets" term_id="secret" >}} in any particular namespace, {{< glossary_tooltip text="secrets" term_id="secret" >}} in any particular namespace,