Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.tensor9.com/llms.txt

Use this file to discover all available pages before exploring further.

You can disable individual permission tiers, re-enable them later, or remove all access entirely. Revocation is immediate - there is no delay or grace period.

What Happens When Permissions Are Revoked

Regardless of environment, here’s what to expect when you revoke a permission tier:
Revoked TierImpact
Steady-stateWe lose visibility into application health. We won’t know if the application is running or has issues.
InstallWe cannot provision infrastructure or perform upgrades. The current deployment continues running.
DeployWe cannot deploy new versions. The current version continues running.
Read-only operationsWe cannot view logs or events for troubleshooting.
Read-write operationsWe cannot restart pods or apply patches.
Admin operationsWe cannot execute commands in containers or port-forward.

Disabling Permissions

To disable a specific permission tier (e.g., prevent us from restarting pods), delete the corresponding cluster role binding.
kubectl delete clusterrolebinding <binding-name>
Once deleted, the controller immediately loses that capability. We cannot perform actions that require that permission tier until you re-enable it.

Example: Disable Admin Operations

If you enabled admin operations for a troubleshooting session and want to revoke it:
kubectl delete clusterrolebinding <admin-ops-binding>
The controller can no longer execute commands inside containers or port-forward. Read-only and read-write operations (if enabled) are unaffected.

Re-Enabling Permissions

To restore a permission tier you previously disabled, re-apply the role binding. The Terraform configuration you applied during installation contains the definitions. You can either:
  1. Re-run terraform apply to restore all bindings to their original state
  2. Create the specific role binding manually with kubectl

Revoking All Access

Option 1 - Delete all cluster role bindings

kubectl get clusterrolebindings | grep <namespace> | awk '{print $1}' | xargs kubectl delete clusterrolebinding

Option 2 - Delete the namespace

kubectl delete namespace <namespace>
This removes everything - the controller, its permissions, its service accounts, and all resources in the namespace. The application will stop running. Use this only if you need to completely remove the deployment.

Auditing Permission Changes

Kubernetes records all RBAC changes in the audit log. You can verify when bindings were created, modified, or deleted:
kubectl get events -n <namespace> --field-selector reason=Created