You can disable individual permission tiers, re-enable them later, or remove all access entirely. Revocation is immediate - there is no delay or grace period.Documentation Index
Fetch the complete documentation index at: https://docs.tensor9.com/llms.txt
Use this file to discover all available pages before exploring further.
What Happens When Permissions Are Revoked
Regardless of environment, here’s what to expect when you revoke a permission tier:| Revoked Tier | Impact |
|---|---|
| Steady-state | We lose visibility into application health. We won’t know if the application is running or has issues. |
| Install | We cannot provision infrastructure or perform upgrades. The current deployment continues running. |
| Deploy | We cannot deploy new versions. The current version continues running. |
| Read-only operations | We cannot view logs or events for troubleshooting. |
| Read-write operations | We cannot restart pods or apply patches. |
| Admin operations | We cannot execute commands in containers or port-forward. |
Disabling Permissions
- Kubernetes
- AWS
To disable a specific permission tier (e.g., prevent us from restarting pods), delete the corresponding cluster role binding.Once deleted, the controller immediately loses that capability. We cannot perform actions that require that permission tier until you re-enable it.The controller can no longer execute commands inside containers or port-forward. Read-only and read-write operations (if enabled) are unaffected.
Example: Disable Admin Operations
If you enabled admin operations for a troubleshooting session and want to revoke it:Re-Enabling Permissions
- Kubernetes
- AWS
To restore a permission tier you previously disabled, re-apply the role binding. The Terraform configuration you applied during installation contains the definitions. You can either:
- Re-run
terraform applyto restore all bindings to their original state - Create the specific role binding manually with kubectl
Revoking All Access
- Kubernetes
- AWS
Auditing Permission Changes
- Kubernetes
- AWS
Kubernetes records all RBAC changes in the audit log. You can verify when bindings were created, modified, or deleted:
Related
- Permissions - What each permission tier allows
- Security Model - The overall security architecture