kube-system-binding.yaml 535 B

123456789101112131415161718
  1. apiVersion: rbac.authorization.k8s.io/v1
  2. kind: RoleBinding
  3. metadata:
  4. name: gce:podsecuritypolicy:unprivileged-addon
  5. namespace: kube-system
  6. labels:
  7. addonmanager.kubernetes.io/mode: Reconcile
  8. kubernetes.io/cluster-service: "true"
  9. roleRef:
  10. apiGroup: rbac.authorization.k8s.io
  11. kind: Role
  12. name: gce:podsecuritypolicy:unprivileged-addon
  13. subjects:
  14. - kind: Group
  15. # All service accounts in the kube-system namespace are allowed to use this.
  16. name: system:serviceaccounts:kube-system
  17. apiGroup: rbac.authorization.k8s.io