AWS S3 Target Permissions
Permissions required to add S3 as a target to T4K
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:ListBucket", "s3:PutObject", "s3:GetObject", "s3:DeleteObject" ], "Resource": [ "arn:aws:s3:::bucketname", "arn:aws:s3:::bucketname/*" ] }, { "Effect": "Deny", "NotAction": "s3:*", "NotResource": [ "arn:aws:s3:::bucketname", "arn:aws:s3:::bucketname/*" ] } ] }{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": [ "arn:aws:iam::111122223333:user/Alice", ] }, "Action": [ "s3:ListBucket", "s3:PutObject", "s3:GetObject", "s3:DeleteObject" ], "Resource": [ "arn:aws:s3:::my_bucket", "arn:aws:s3:::my_bucket/*" ] } ] }
apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: allow-privileged spec: privileged: truekubectl apply -f allow-privileged-psp.yamlapiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: use-allow-privileged-psp rules: - apiGroups: ['policy'] resources: ['podsecuritypolicies'] verbs: ['use'] resourceNames: ['allow-privileged'] # Use the name of your PSPkubectl apply -f cluster-role.yamlapiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: bind-allow-privileged-psp roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: use-allow-privileged-psp # Use the name of your ClusterRole subjects: - kind: ServiceAccount name: default # Use the appropriate ServiceAccount name or account that you want to apply the PSP to namespace: backup-namespace # Specify the target namespacekubectl apply -f cluster-role-binding.yaml
Last updated