add special note for RBAC users

Signed-off-by: Matthew Fisher <matt.fisher@microsoft.com>
pull/4597/head
Matthew Fisher 7 years ago
parent 37a731db79
commit 792d841cce
No known key found for this signature in database
GPG Key ID: 92AA783CBAAE8E3B

@ -113,6 +113,12 @@ Tiller, the server portion of Helm, typically runs inside of your
Kubernetes cluster. But for development, it can also be run locally, and
configured to talk to a remote Kubernetes cluster.
### Special Note for RBAC Users
Most cloud providers enable a feature called Role-Based Access Control - RBAC for short. If your cloud provider enables this feature, you will need to create a service account for Tiller with the right roles and permissions to access resources.
Check the [Kubernetes Distribution Guide](kubernetes_distros.md) to see if there's any further points of interest on using Helm with your cloud provider. Also check out the guide on [Tiller and Role-Based Access Control](rbac.md) for more information on how to run Tiller in an RBAC-enabled Kubernetes cluster.
### Easy In-Cluster Installation
The easiest way to install `tiller` into the cluster is simply to run

Loading…
Cancel
Save