Skip to content

For help, click the link below to get free database assistance or contact our experts for personalized support.

Pod scheduling policies with RBAC

As an admin in Percona Everest, you can restrict access to configuring or applying specific Pod scheduling policies for certain users. To achieve this, you can define access policies usingPercona Everest’s Role-Based Access Control (RBAC) functionality.

RBAC policies in Percona Everest apply to the entire Pod scheduling policy, including all the affinity rules defined within it.

Note

Assigning RBAC permissions to individual affinity rules within a policy is impossible—access is managed at the policy level as a whole.

Use cases for Pod Scheduling policies with RBAC

Limited access to Pod scheduling policy configuration

As a Percona Everest Admin, you can allow only specific users to manage Pod Scheduling Policies (create, edit, read, and delete) while restricting other users to read-only access. These users can view and apply the existing policies to database clusters but cannot modify or delete them.

Example

Here’s an example of RBAC policy displaying how to grant full access to one user (e.g., alice) and read-only access to others:

p, alice, pod-scheduling-policies, *, *
p, role:team-dev, pod-scheduling-policies, read, *

Limited usage of Pod scheduling policy by users

As a Percona Everest Admin, you can allow a particular user to use a specific Pod scheduling policy. The rest of the users are not allowed to use this policy at all (that is, they cannot see it in the system and cannot assign it to DB clusters that they create or modify).

Example

Here’s an example of RBAC policy that grants limited access to just one user (e.g., bob):

p, bob, pod-scheduling-policies, read, pod-scheduling-policy-1