parts/k8s/addons/aad-default-admin-group-rbac.yaml (15 lines of code) (raw):
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: aad-default-admin-group
labels:
kubernetes.io/cluster-service: "true"
addonmanager.kubernetes.io/mode: EnsureExists
subjects:
- kind: Group
name: {{ContainerConfig "adminGroupID"}}
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: cluster-admin
apiGroup: rbac.authorization.k8s.io