Difference between revisions of "Kind: ClusterRoleBinding"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
{{lc}} | {{lc}} | ||
+ | |||
+ | |||
+ | apiVersion: rbac.authorization.k8s.io/v1 | ||
+ | # This cluster role binding allows anyone in the "manager" group to read secrets in any namespace. | ||
+ | kind: ClusterRoleBinding | ||
+ | metadata: | ||
+ | name: read-secrets-global | ||
+ | subjects: | ||
+ | - kind: Group | ||
+ | name: manager # Name is case sensitive | ||
+ | apiGroup: rbac.authorization.k8s.io | ||
+ | [[roleRef:]] | ||
+ | kind: ClusterRole | ||
+ | name: secret-reader | ||
+ | apiGroup: rbac.authorization.k8s.io | ||
Revision as of 12:40, 31 October 2023
apiVersion: rbac.authorization.k8s.io/v1 # This cluster role binding allows anyone in the "manager" group to read secrets in any namespace. kind: ClusterRoleBinding metadata: name: read-secrets-global subjects: - kind: Group name: manager # Name is case sensitive apiGroup: rbac.authorization.k8s.io roleRef: kind: ClusterRole name: secret-reader apiGroup: rbac.authorization.k8s.io
roleRef RoleBinding
Related
See also
Advertising: