You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
####The proper/secure way for Kubernetes Cluster 1.24+
355
+
356
+
For production environments you should create a service account and/or role for Codefresh access.
357
+
The minimum permissions Codefresh needs to work with the cluster are the following:
358
+
359
+
`codefresh-role.yml`
360
+
{% highlight yaml %}
361
+
{% raw %}
362
+
kind: ClusterRole
363
+
apiVersion: rbac.authorization.k8s.io/v1
364
+
metadata:
365
+
name: codefresh-role
366
+
rules:
367
+
- apiGroups:[“”]
368
+
resources:[“*”]
369
+
verbs:[“list”, “watch”, “get”]
370
+
{% endraw %}
371
+
{% endhighlight %}
372
+
373
+
Note that these permissions will only allow Codefresh to read the cluster resources and populate the respective dashboards. You need to give more privileges for actual deployments. For more information see the[Kubernetes RBAC documentation page](https://kubernetes.io/docs/reference/access-authn-authz/rbac/).
374
+
375
+
Here is an example with role + service account + binding.