From c60abb4dd051ac59375335cc6bc9476e73eecf02 Mon Sep 17 00:00:00 2001 From: Matthew Fisher <matt.fisher@microsoft.com> Date: Thu, 1 Nov 2018 10:17:46 -0700 Subject: [PATCH] add special note for RBAC users (#4597) Signed-off-by: Matthew Fisher <matt.fisher@microsoft.com> --- docs/install.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/docs/install.md b/docs/install.md index 96d9bc9f7..e0e3db56d 100755 --- a/docs/install.md +++ b/docs/install.md @@ -113,6 +113,12 @@ Tiller, the server portion of Helm, typically runs inside of your Kubernetes cluster. But for development, it can also be run locally, and configured to talk to a remote Kubernetes cluster. +### Special Note for RBAC Users + +Most cloud providers enable a feature called Role-Based Access Control - RBAC for short. If your cloud provider enables this feature, you will need to create a service account for Tiller with the right roles and permissions to access resources. + +Check the [Kubernetes Distribution Guide](kubernetes_distros.md) to see if there's any further points of interest on using Helm with your cloud provider. Also check out the guide on [Tiller and Role-Based Access Control](rbac.md) for more information on how to run Tiller in an RBAC-enabled Kubernetes cluster. + ### Easy In-Cluster Installation The easiest way to install `tiller` into the cluster is simply to run -- GitLab