Administrator
- Administrator
- All Products
The permissions in this code snippet applies to all namespaces.apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: optimized-cluster-role rules: - apiGroups: [""] resources: ["services","pods","secrets","configmaps"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"] - apiGroups: ["apps"] resources: ["daemonsets","deployments"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"] - apiGroups: [""] resources: ["nodes"] verbs: ["watch","list","get","patch"] - apiGroups: [""] resources: ["namespaces","persistentvolumeclaims"] verbs: ["watch","list","get"]
apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: rbac-informatica-np-admin namespace: informatica rules: - apiGroups: [""] resources: ["services","pods","secrets","configmaps"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"] - apiGroups: ["apps"] resources: ["daemonsets","deployments"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"]
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: rbac-informatica-global-admin rules: - apiGroups: [""] resources: ["nodes"] verbs: ["watch","list","get","patch"] - apiGroups: [""] resources: ["namespaces", "persistentvolumeclaims"] verbs: ["watch","list","get"]
The permissions in this code snippet applies to all namespaces.apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: optimized-cluster-role rules: - apiGroups: [""] resources: ["services","pods","secrets","configmaps"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"] - apiGroups: [""] resources: ["nodes"] verbs: ["watch","list","get"] - apiGroups: [""] resources: ["namespaces","persistentvolumeclaims"] verbs: ["watch","list","get"]
apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: rbac-informatica-np-admin namespace: informatica rules: - apiGroups: [""] resources: ["services","pods","secrets","configmaps"] verbs: ["watch","list","get","create","update","patch","delete","deletecollection"]
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: rbac-informatica-global-admin rules: - apiGroups: [""] resources: ["nodes"] verbs: ["watch","list","get"] - apiGroups: [""] resources: ["namespaces", "persistentvolumeclaims"] verbs: ["watch","list","get"]