diff --git a/.vuepress/config-sidebar.js b/.vuepress/config-sidebar.js
index 4043990..74594f6 100644
--- a/.vuepress/config-sidebar.js
+++ b/.vuepress/config-sidebar.js
@@ -398,6 +398,7 @@ module.exports = {
collapsable: true,
children: [
'k8s-advanced/sec/rbac/api',
+ 'k8s-advanced/sec/rbac/default',
'k8s-advanced/sec/rbac/example',
]
},
diff --git a/.vuepress/config.js b/.vuepress/config.js
index 3435d3b..adc5c6d 100644
--- a/.vuepress/config.js
+++ b/.vuepress/config.js
@@ -23,7 +23,6 @@ module.exports = {
s.parentNode.insertBefore(hm, s);
})();
`],
-
// ['script', {src: '/java-script-dist/swiper-4.5.0/js/swiper.min.js', async: true}],
// ['script', {src: "https://www.googletagmanager.com/gtag/js?id=UA-144196556-1", async: true}],
// ['script', {}, `
diff --git a/learning/k8s-advanced/sec/rbac/default.md b/learning/k8s-advanced/sec/rbac/default.md
new file mode 100644
index 0000000..11db3c6
--- /dev/null
+++ b/learning/k8s-advanced/sec/rbac/default.md
@@ -0,0 +1,127 @@
+---
+vssueId: 175
+layout: LearningLayout
+description: Kubernetes教程_Role-based_access_control_(RBAC)基于角色的访问控制_是Kubernetes中支持的一种授权方式。使用rbac.authorization.k8s.io_API来驱动授权决策_允许管理员通过该API动态配置授权策略。
+meta:
+ - name: keywords
+ content: Kubernetes 教程,Kubernetes 授权,Kubernetes RBAC,Kubernetes权限,Kubernetes默认角色
+---
+
+# RBAC default Roles and Role Bindings
+
+
**system:unauthenticated** groups | 授予用户只读权限,读取集群的非敏感信息。自 1.14 开始引入。 |
+
+
+## User-facing Roles
+
+一部分默认 Role 没有 `system:` 前缀,这些是直接给用户使用的(user-facing),包括:
+* 超级用户的角色(`cluster-admin`)
+* 可通过 ClusterRoleBinding 绑定的集群级别的角色(`cluster-status`)
+* 可通过 RoleBinding 绑定到特定名称空间的角色(`admin`、`edit`、`view`)
+
+从 Kubernetes 1.9 开始,user-facing roles 使用 [ClusterRole Aggregation](./api.html#aggregated-clusterroles) 以使管理员在其中包含 Custom Resource 的授权规则。想 `admin`、`edit`、`view` 等角色添加授权规则时,可创建一个 ClusterRole,包含一个或多个下述标签即可:
+
+``` yaml
+metadata:
+ labels:
+ rbac.authorization.k8s.io/aggregate-to-admin: "true"
+ rbac.authorization.k8s.io/aggregate-to-edit: "true"
+ rbac.authorization.k8s.io/aggregate-to-view: "true"
+```
+
+| Default ClusterRole | Default ClusterRoleBinding | Description |
+| ------------------- | -------------------------- | ------------------------------------------------------------ |
+| cluster-admin | **system:masters** group | 允许超级用户针对任意资源执行任意操作。如果绑定到 **ClusterRoleBinding**,将授予被授权主体针对集群中以及所有名称空间中任意资源的完全控制权。如果绑定到 **RoleBinding**,将授予被授权主体针对该名称空间下所有资源的完全控制权(包括名称空间本身) |
+| admin | None | 授予管理员访问权限,可以被用来绑定到名称空间中的 **RoleBinding**。此时,允许对名称空间中大多数资源的 read/write 访问,包括在名称空间中创建 role 以及 rolebinding 的权限。但是不允许对 resource quota 或名称空间本身执行 write 操作。 |
+| edit | None | 授予名称空间中大多数资源的 read/write 权限。但是不能够查看或编辑 role 和 rolebinding |
+| view | None | 授予名称空间中大多数资源的 read-only 权限。但是不允许查看 role 和 rolebinding,也不允许查看 secrets。 |
+
+## Core Component Roles
+
+| Default ClusterRole | Default ClusterRoleBinding | Description |
+| ---------------------------------- | --------------------------------------- | ------------------------------------------------------------ |
+| **system:kube-scheduler** | **system:kube-scheduler** user | 允许访问 kube-scheduler 组件所需要的资源 |
+| **system:volume-scheduler** | **system:kube-scheduler** user | 允许访问 kube-scheduler 组件所需要的数据卷资源 |
+| **system:kube-controller-manager** | **system:kube-controller-manager** user | 允许访问 kube-controller-manager 组件所需的资源。特定控制器所需的权限定义在 [controller roles](#controller-roles) 当中 |
+| **system:node** | None in 1.8+ | 允许访问 kubelet 组件所需的资源,包括 读取所有的 secrets,写入所有的 pod status。在 kubernetes 1.7 中,推荐使用 [Node authorizer](https://kubernetes.io/docs/reference/access-authn-authz/node/) 和 [NodeRestriction admission plugin](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#noderestriction),而不是这个 role,并且推荐为 kubelet 授予访问运行在其所在节点上的 Pod 的 API 权限。在 1.7 之前,此角色被自动绑定到 `system:nodes` group。在 1.7 中,如果 `Node` authorization 模式未启用,此角色被自动绑定到 `system:nodes` group。自 1.8 开始,将不会为其自动创建角色绑定 |
+| **system:node-proxier** | **system:kube-proxy** user | |
+
+## Other Component Roles
+
+| Default ClusterRole | Default ClusterRoleBinding | Description |
+| ---------------------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------ |
+| **system:auth-delegator** | None | Allows delegated authentication and authorization checks. This is commonly used by add-on API servers for unified authentication and authorization. |
+| **system:heapster** | None | Role for the [Heapster](https://github.com/kubernetes/heapster) component. |
+| **system:kube-aggregator** | None | Role for the [kube-aggregator](https://github.com/kubernetes/kube-aggregator) component. |
+| **system:kube-dns** | **kube-dns** service account in the **kube-system** namespace | Role for the [kube-dns](https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/) component. |
+| **system:kubelet-api-admin** | None | 允许访问所有的 kubelet API. |
+| **system:node-bootstrapper** | None | 允许访问执行 [Kubelet TLS bootstrapping](https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) 时所需要的资源 |
+| **system:node-problem-detector** | None | Role for the [node-problem-detector](https://github.com/kubernetes/node-problem-detector) component. |
+| **system:persistent-volume-provisioner** | None | 允许访问大多数 [dynamic volume provisioners](https://kubernetes.io/docs/concepts/storage/persistent-volumes/#provisioner) 所需要的资源 |
+
+
+
+## Controller Roles
+
+[Kubernetes controller manager](https://kubernetes.io/docs/admin/kube-controller-manager/) 中包含了核心的控制器。如果其启动参数中添加了 `--use-service-account-credentials`,每一个控制器在启动时都将使用单独的 service account,并绑定到对应的角色(以`system:controller` 为前缀)。如果 Kubernetes controller manager 启动是不带参数 `--use-service-account-credentials`,则所有的控制器都使用其自身的身份标识,此时,必须为其绑定所有的相关角色。这些角色包括:
+
+- system:controller:attachdetach-controller
+- system:controller:certificate-controller
+- system:controller:clusterrole-aggregation-controller
+- system:controller:cronjob-controller
+- system:controller:daemon-set-controller
+- system:controller:deployment-controller
+- system:controller:disruption-controller
+- system:controller:endpoint-controller
+- system:controller:expand-controller
+- system:controller:generic-garbage-collector
+- system:controller:horizontal-pod-autoscaler
+- system:controller:job-controller
+- system:controller:namespace-controller
+- system:controller:node-controller
+- system:controller:persistent-volume-binder
+- system:controller:pod-garbage-collector
+- system:controller:pv-protection-controller
+- system:controller:pvc-protection-controller
+- system:controller:replicaset-controller
+- system:controller:replication-controller
+- system:controller:resourcequota-controller
+- system:controller:root-ca-cert-publisher
+- system:controller:route-controller
+- system:controller:service-account-controller
+- system:controller:service-controller
+- system:controller:statefulset-controller
+- system:controller:ttl-controller
\ No newline at end of file
diff --git a/overview/share-coder.assets/image-20191217133227879.png b/overview/share-coder.assets/image-20191217133227879.png
new file mode 100644
index 0000000..70d5379
Binary files /dev/null and b/overview/share-coder.assets/image-20191217133227879.png differ
diff --git a/overview/share-coder.assets/kuboard.demo.eip.work.png b/overview/share-coder.assets/kuboard.demo.eip.work.png
new file mode 100644
index 0000000..89fa3b4
Binary files /dev/null and b/overview/share-coder.assets/kuboard.demo.eip.work.png differ
diff --git a/overview/share-coder.md b/overview/share-coder.md
index 3182c0a..acf3bf6 100644
--- a/overview/share-coder.md
+++ b/overview/share-coder.md
@@ -22,11 +22,13 @@ Kubernetes 容器编排已越来越被大家关注,然而学习 Kubernetes 的
* Kuboard 官网提供 Spring Cloud 等微服务参考架构在 K8S 上的详细部署文档和步骤,是 Spring Cloud 用户将自己的应用迁移到 K8S 部署环境的非常好的参考资料。
-Kuboard 发布不到两个月时间,github star 已经迅速增长到 461,获得了许多用户的喜爱。
-
-
-