npm/deploy/manifests/common/rbac.yaml (44 lines of code) (raw):

--- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: azure-npm namespace: kube-system labels: addonmanager.kubernetes.io/mode: EnsureExists rules: - apiGroups: - "" resources: - pods - nodes - namespaces verbs: - get - list - watch - apiGroups: - networking.k8s.io resources: - networkpolicies verbs: - get - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: azure-npm-binding namespace: kube-system labels: addonmanager.kubernetes.io/mode: EnsureExists subjects: - kind: ServiceAccount name: azure-npm namespace: kube-system roleRef: kind: ClusterRole name: azure-npm apiGroup: rbac.authorization.k8s.io ---