This topic covers details for writing policies to control access to Kubernetes Engine.
Resource-Types
Aggregate Resource-Type
cluster-family
Individual Resource-Types
clusters
cluster-node-pools
cluster-pod-shapes
cluster-virtualnode-pools
cluster-work-requests
cluster-workload-mappings
Comments
A policy that uses <verb> cluster-family is equivalent to writing one with a separate <verb> <individual resource-type> statement for each of the individual resource-types.
See the table in Details for Verb + Resource-Type Combinations for details of the API operations covered by each verb, for each individual resource-type included in cluster-family.
The clusters resource type can use the following variables:
Variable
Variable Type
Comments
target.cluster.id
Entity (OCID)
The cluster-node-pools resource type can use the following variables:
Variable
Variable Type
Comments
target.nodepool.id
Entity (OCID)
The cluster-virtual-node-pools resource type can use the following variables:
Variable
Variable Type
Comments
target.virtualnodepool.id
Entity (OCID)
target.cluster.id
Entity (OCID)
The cluster-workload-mappings resource type can use the following variables:
Variable
Variable Type
Comments
target.clusterworkloadmapping.id
Entity (OCID)
target.mapping.cluster_id
Entity (OCID)
Details for Verb + Resource-Type Combinations 🔗
The following tables show the permissions and API operations covered by each verb. The level of access is cumulative as you go from inspect > read > use > manage. For example, a group that can use a resource can also inspect and read that resource. A plus sign (+) in a table cell indicates incremental access compared to the cell directly above it, whereas "no extra" indicates no incremental access.
For example, the read verb for the clusters resource-type includes the same permissions and API operations as the inspect verb, plus the CLUSTER_READ permission and a number of API operations (e.g., GetCluster, etc.). The use verb covers still another permission and API operation compared to read. Lastly, manage covers more permissions and operations compared to use.
CreateCluster (also need use subnets, read
virtual-network-family, inspect
compartments, use vnics, use
network-security-groups, use
private-ips, and manage
public-ips)
DeleteCluster (also need manage
cluster-node-pools, manage
instance-family, use subnets,
use vnics, use private-ips,
and manage public-ips)
UpdateClusterEndpointConfig (also need use
vnics, use network-security-groups,
use private-ips, and manage
public-ips)