skip to content
Alvin Lucillo

Impersonating k8s access

/ 1 min read

Suppose you created a clusterrole for usuario1. You can test if that user can perform list on the given resource by impersonating the user with --as

k create clusterrole storage-admin --verb=list --resource=persistentvolumeclaims,storageclasses.storage.k8s.io
k create clusterrolebinding --clusterrole=storage-admin --user=usuario1

k get pvc --as usuario1
k get sc --as usuario1