Administrators are encouraged to consider the implications of providing access to the snapshotscheduler. It allows users to create a potentially very large number of volume snapshots.
The use of RBAC rules and ResourceQuota to control access is strongly encouraged.
If you believe you have discovered a security vulnerability, please directly
mail jstrunk@redhat.com, and do not open an
Issue. If you would like to encrypt the mail, please use gpg key 0xBD1FF508
.
The fingerprint is:
74FC 7E7E FD0F F009 513C C9E3 9360 133D BD1F F508