From kube-dc
Manage Kube-DC organization groups and RBAC — create OrganizationGroup resources to map user groups to Kubernetes roles per project. Note that user management is UI-only (Keycloak).
npx claudepluginhub kube-dc/kube-dc-public --plugin kube-dcThis skill uses the workspace's default tool permissions.
- Organization must exist and be Ready
Configures Kubernetes RBAC to enforce least privilege access on cluster resources. Covers Role/ClusterRole design, RoleBinding setup, service account security, namespace isolation, and audit logging for multi-tenant clusters.
Create a new Kube-DC project with isolated VPC networking inside an existing organization. Handles network type selection (cloud vs public), organization verification, and project manifest generation.
Manages TrueFoundry roles, teams, and collaborators via Bash API scripts. Lists, creates, deletes custom roles and teams; grants/revokes access to workspaces, apps, and resources. Use for permission and team management.
Share bugs, ideas, or general feedback.
{org}admin, developer, project-manager, userapiVersion: kube-dc.com/v1
kind: OrganizationGroup
metadata:
name: {group-name}
namespace: {org} # MUST be in the organization namespace
spec:
permissions:
- project: {project-1}
roles:
- developer # Full CRUD on VMs and workloads
- project: {project-2}
roles:
- admin # Full admin access
- project: {project-3}
roles:
- project-manager # Read-only + console/VNC
See @org-group-template.yaml
| Role | Access Level |
|---|---|
admin | Full admin access to the project |
developer | CRUD on VMs, workloads, databases, networking |
project-manager | Read-only + console/VNC access |
user | Basic read access |
Custom roles can also be referenced if a Kubernetes Role exists in the target project namespace.
kubectl get organizationgroup -n {org}
kubectl describe organizationgroup {group-name} -n {org}
Edit the OrganizationGroup to add/remove project-role mappings:
kubectl edit organizationgroup {group-name} -n {org}
Users are managed via the Kube-DC console:
Agents CANNOT create, delete, or modify users via kubectl.
After creating an OrganizationGroup:
# 1. Check group was created
kubectl get organizationgroup {group-name} -n {org}
# Expected: resource exists
# 2. Check RoleBindings were created in project namespaces
kubectl get rolebinding -n {org}-{project-1} | grep {group-name}
# Expected: RoleBinding for each project-role pair
# 3. Check group status/conditions
kubectl describe organizationgroup {group-name} -n {org}
# Expected: no error events, conditions show reconciled
Success: OrganizationGroup exists, RoleBindings present in target project namespaces. Failure: