Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-7082

Deny a particular user or all users to not do "rsh" to a particular pod or deployment. If we use roles, then that user will not have rsh access to all the pods but we want to restrict rsh access to a particular pod/deployment.

XMLWordPrintable

    • Icon: Feature Request Feature Request
    • Resolution: Won't Do
    • Icon: Undefined Undefined
    • None
    • None
    • oc
    • None
    • False
    • None
    • False
    • Not Selected

      1. Proposed title of this feature request

      --> Deny a particular user or all users to not do "rsh" to a particular pod or deployment. 

             2.  What is the nature and description of the request?

      Want a feature for that in OpenShift as it is requirement of multiple users.

            3.  Why does the customer need this? (List the business requirements here)

      Cu had some application pods( database pods ) whose credentials are contained inside the secret and that secret is attached to the deployment but when Cu is logging inside the pod, then he can see the sensitive data that was contained inside the secret as that database pods take that data as the environment variables. So, Cu wants to restrict rsh to only those database pods for the admin user and other users as well.

      4. List any affected packages or components.

      Pods

              gausingh@redhat.com Gaurav Singh
              rhn-support-shupadhy Shivam Upadhyay
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: