Kubernetes policies are configurations that manage other configurations or runtime behaviors.

You can control the access to computational resources at various levels, such as:
  • Cluster-level access control (binary): Defines whether the user can access the cluster or not.
  • Namespace-level access control (binary): Defines whether a user can access the namespace or not.
  • Kubernetes-level access control: Defines what resources a user can access.

Telco Cloud Automation allows you to create different security domains within a single Kubernetes cluster. These security domains are associated with users, network function packages, or instances.