--- apiVersion: v1 kind: ServiceAccount metadata: name: p5x-api-sa namespace: p5x-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: p5x-api-configmap-role namespace: p5x-system rules: - apiGroups: [""] resources: ["configmaps"] resourceNames: ["dynamic-kv"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: p5x-api-configmap-binding namespace: p5x-system subjects: - kind: ServiceAccount name: p5x-api-sa namespace: p5x-system roleRef: kind: Role name: p5x-api-configmap-role apiGroup: rbac.authorization.k8s.io --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: pod-self-read-role namespace: p5x-system rules: - apiGroups: [""] resources: ["pods"] verbs: ["get"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: pod-self-read-binding namespace: p5x-system subjects: - kind: ServiceAccount name: p5x-api-sa namespace: p5x-system roleRef: kind: Role name: pod-self-read-role apiGroup: rbac.authorization.k8s.io --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: node-label-read-role rules: - apiGroups: [""] resources: ["nodes"] verbs: ["get", "list", "watch"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: node-label-read-binding subjects: - kind: ServiceAccount name: p5x-api-sa namespace: p5x-system roleRef: kind: ClusterRole name: node-label-read-role apiGroup: rbac.authorization.k8s.io