Difference between revisions of "Kubectl create clusterrolebinding"
Jump to navigation
Jump to search
Line 4: | Line 4: | ||
== [[EKS]] == | == [[EKS]] == | ||
− | kubectl create clusterrolebinding [[ops-user-cluster-admin-binding]] --clusterrole=[[cluster-admin]] [[--user]]=ops-user | + | kubectl create clusterrolebinding [[ops-user-cluster-admin-binding]] [[--clusterrole]]=[[cluster-admin]] [[--user]]=ops-user |
kubectl create clusterrolebinding [[tiller]] --clusterrole=cluster-admin [[--serviceaccount]]=[[kube-system:tiller]] | kubectl create clusterrolebinding [[tiller]] --clusterrole=cluster-admin [[--serviceaccount]]=[[kube-system:tiller]] |
Revision as of 11:58, 4 October 2023
https://www.mankier.com/1/kubectl-create-clusterrolebinding
kubectl create clusterrolebinding
EKS
kubectl create clusterrolebinding ops-user-cluster-admin-binding --clusterrole=cluster-admin --user=ops-user
kubectl create clusterrolebinding tiller --clusterrole=cluster-admin --serviceaccount=kube-system:tiller clusterrolebinding.rbac.authorization.k8s.io/tiller created
kubectl create clusterrolebinding add-on-cluster-admin --clusterrole=cluster-admin --serviceaccount=kube-system:default
Related
- Kubernetes dashboard
- https://github.com/kubernetes/dashboard/blob/master/docs/user/access-control/creating-sample-user.md
kind: ClusterRoleBinding
kubectl create rolebinding
kubectl create serviceaccount
See also
- Kubernetes RBAC
kubectl auth, kubectl auth can-i, kubectl auth reconcile
kubectl create [ role | clusterrole | clusterrolebinding
|rolebinding | serviceaccount ], groups:
, Kubernetes RBAC good practices,kube2iam
, K8s Cluster roles,rbac.authorization.k8s.io
,system:
- RBAC, ABAC, Kubernetes RBAC, ArgoCD RBAC
Advertising: