Update rbac.md
The page renders the third bullet as a run-on sentence. I'm suggesting the example be placed in parentheses.pull/25856/head
parent
5744728ae4
commit
95577c1fa5
|
@ -86,8 +86,8 @@ Because ClusterRoles are cluster-scoped, you can also use them to grant access t
|
||||||
* cluster-scoped resources (like {{< glossary_tooltip text="nodes" term_id="node" >}})
|
* cluster-scoped resources (like {{< glossary_tooltip text="nodes" term_id="node" >}})
|
||||||
* non-resource endpoints (like `/healthz`)
|
* non-resource endpoints (like `/healthz`)
|
||||||
* namespaced resources (like Pods), across all namespaces
|
* namespaced resources (like Pods), across all namespaces
|
||||||
For example: you can use a ClusterRole to allow a particular user to run
|
(for example: you can use a ClusterRole to allow a particular user to run
|
||||||
`kubectl get pods --all-namespaces`.
|
`kubectl get pods --all-namespaces`)
|
||||||
|
|
||||||
Here is an example of a ClusterRole that can be used to grant read access to
|
Here is an example of a ClusterRole that can be used to grant read access to
|
||||||
{{< glossary_tooltip text="secrets" term_id="secret" >}} in any particular namespace,
|
{{< glossary_tooltip text="secrets" term_id="secret" >}} in any particular namespace,
|
||||||
|
|
Loading…
Reference in New Issue