ClusterRole 생성 후 ClusterRoleBinding 연결

조건

  • clusterrole name : deployment-clusterrole
  • clusterrole rules : deployment, statefulset, daemonset 에 대하여 생성권한
  • clusterrole namespace : app-team1
  • clusterrolebinding : serviceaccount ID 는 git
  • clusterrolebinding namespace : dev

 

 

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  namespace: dev
  name: deployment-clusterrole

rules:
- apiGroups: [""]
  resources: ["Deployment", "StatefulSet", "DaemonSet"]
  verbs: ["create"]
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  creationTimestamp: null
  name: any-name
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: deployment-clusterrole
subjects:
- kind: ServiceAccount
  name: git
  namespace: dev

 

https://kubernetes.io/docs/reference/access-authn-authz/rbac/

'k8s > CKA' 카테고리의 다른 글

[연습]6. Pod run with env  (0) 2023.03.02
[연습]5. Pod run  (0) 2023.03.02
[연습]4. expose AND service  (0) 2023.03.02
[연습]3. NetworkPolicy  (0) 2023.03.02
[연습]2. cordon AND drain  (0) 2023.03.02

+ Recent posts