apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-deploy namespace: default rules: - apiGroups: [""] resources: ["pods", "pods/log", "pods/exec", "pods/attach", "services", "secrets", "configmaps", "persistentvolumes", "persistentvolumeclaims"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] - apiGroups: ["apps"] resources: ["deployments", "replicasets", "daemonsets", "statefulsets"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] - apiGroups: ["batch"] resources: ["jobs", "cronjobs"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] - apiGroups: ["extensions", "networking.k8s.io"] resources: ["ingresses", "networkpolicies"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: default-deploy namespace: default subjects: - kind: ServiceAccount name: default namespace: default roleRef: kind: Role name: default-deploy apiGroup: rbac.authorization.k8s.io