add special note for RBAC users (#4597)

Signed-off-by: Matthew Fisher <matt.fisher@microsoft.com>
pull/4877/head
Matthew Fisher 7 years ago committed by GitHub
parent 8442851a5c
commit c60abb4dd0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -113,6 +113,12 @@ Tiller, the server portion of Helm, typically runs inside of your
Kubernetes cluster. But for development, it can also be run locally, and Kubernetes cluster. But for development, it can also be run locally, and
configured to talk to a remote Kubernetes cluster. configured to talk to a remote Kubernetes cluster.
### Special Note for RBAC Users
Most cloud providers enable a feature called Role-Based Access Control - RBAC for short. If your cloud provider enables this feature, you will need to create a service account for Tiller with the right roles and permissions to access resources.
Check the [Kubernetes Distribution Guide](kubernetes_distros.md) to see if there's any further points of interest on using Helm with your cloud provider. Also check out the guide on [Tiller and Role-Based Access Control](rbac.md) for more information on how to run Tiller in an RBAC-enabled Kubernetes cluster.
### Easy In-Cluster Installation ### Easy In-Cluster Installation
The easiest way to install `tiller` into the cluster is simply to run The easiest way to install `tiller` into the cluster is simply to run

Loading…
Cancel
Save