parts/k8s/addons/aad-default-admin-group-rbac.yaml (15 lines of code) (raw):

kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: aad-default-admin-group labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: EnsureExists subjects: - kind: Group name: {{ContainerConfig "adminGroupID"}} apiGroup: rbac.authorization.k8s.io roleRef: kind: ClusterRole name: cluster-admin apiGroup: rbac.authorization.k8s.io