Difference between revisions of "Kubectl create clusterrolebinding"
Jump to navigation
Jump to search
Line 6: | Line 6: | ||
kubectl create clusterrolebinding ops-user-cluster-admin-binding --clusterrole=[[cluster-admin]] [[--user]]=ops-user | kubectl create clusterrolebinding ops-user-cluster-admin-binding --clusterrole=[[cluster-admin]] [[--user]]=ops-user | ||
kubectl create clusterrolebinding [[tiller]] --clusterrole=cluster-admin [[--serviceaccount]]=[[kube-system:tiller]] | kubectl create clusterrolebinding [[tiller]] --clusterrole=cluster-admin [[--serviceaccount]]=[[kube-system:tiller]] | ||
+ | [[clusterrolebinding]].[[rbac.authorization.k8s.io]]/tiller created | ||
Revision as of 18:32, 29 June 2022
https://www.mankier.com/1/kubectl-create-clusterrolebinding
kubectl create clusterrolebinding
kubectl create clusterrolebinding ops-user-cluster-admin-binding --clusterrole=cluster-admin --user=ops-user kubectl create clusterrolebinding tiller --clusterrole=cluster-admin --serviceaccount=kube-system:tiller clusterrolebinding.rbac.authorization.k8s.io/tiller created
Related
- Kubernetes dashboard
- https://github.com/kubernetes/dashboard/blob/master/docs/user/access-control/creating-sample-user.md
kind: ClusterRoleBinding
kubectl create rolebinding
See also
- Kubernetes RBAC
kubectl auth, kubectl auth can-i, kubectl auth reconcile
kubectl create [ role | clusterrole | clusterrolebinding
|rolebinding | serviceaccount ], groups:
, Kubernetes RBAC good practices,kube2iam
, K8s Cluster roles,rbac.authorization.k8s.io
,system:
- RBAC, ABAC, Kubernetes RBAC, ArgoCD RBAC
Advertising: