From c60abb4dd051ac59375335cc6bc9476e73eecf02 Mon Sep 17 00:00:00 2001
From: Matthew Fisher <matt.fisher@microsoft.com>
Date: Thu, 1 Nov 2018 10:17:46 -0700
Subject: [PATCH] add special note for RBAC users (#4597)

Signed-off-by: Matthew Fisher <matt.fisher@microsoft.com>
---
 docs/install.md | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/docs/install.md b/docs/install.md
index 96d9bc9f7..e0e3db56d 100755
--- a/docs/install.md
+++ b/docs/install.md
@@ -113,6 +113,12 @@ Tiller, the server portion of Helm, typically runs inside of your
 Kubernetes cluster. But for development, it can also be run locally, and
 configured to talk to a remote Kubernetes cluster.
 
+### Special Note for RBAC Users
+
+Most cloud providers enable a feature called Role-Based Access Control - RBAC for short. If your cloud provider enables this feature, you will need to create a service account for Tiller with the right roles and permissions to access resources.
+
+Check the [Kubernetes Distribution Guide](kubernetes_distros.md) to see if there's any further points of interest on using Helm with your cloud provider. Also check out the guide on [Tiller and Role-Based Access Control](rbac.md) for more information on how to run Tiller in an RBAC-enabled Kubernetes cluster.
+
 ### Easy In-Cluster Installation
 
 The easiest way to install `tiller` into the cluster is simply to run
-- 
GitLab