Difference between revisions of "Kind: ClusterRoleBinding"
Jump to navigation
Jump to search
Line 24: | Line 24: | ||
== Related == | == Related == | ||
* [[K8s Cluster roles]] | * [[K8s Cluster roles]] | ||
+ | * [[cluster-read-only-role]] | ||
== See also == | == See also == |
Revision as of 12:41, 31 October 2023
apiVersion: rbac.authorization.k8s.io/v1 # This cluster role binding allows anyone in the "manager" group to read secrets in any namespace. kind: ClusterRoleBinding metadata: name: read-secrets-global subjects: - kind: Group name: manager # Name is case sensitive apiGroup: rbac.authorization.k8s.io roleRef: kind: ClusterRole name: secret-reader apiGroup: rbac.authorization.k8s.io
https://kubernetes.io/docs/reference/access-authn-authz/rbac/#clusterrolebinding-example
roleRef RoleBinding
Related
See also
- K8s Cluster roles:
cluster-admin, admin, edit, view
,cluster-read-only-role
- Kubernetes RBAC
kubectl auth, kubectl auth can-i, kubectl auth reconcile
kubectl create [ role | clusterrole | clusterrolebinding
|rolebinding | serviceaccount ], groups:
, Kubernetes RBAC good practices,kube2iam
, K8s Cluster roles,rbac.authorization.k8s.io
,system:
Advertising: