# This example shows the roles required for a user to be able to use Mizu in all namespaces. kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: mizu-runner-clusterrole rules: - apiGroups: [""] resources: ["pods"] verbs: ["get", "list", "watch", "delete"] - apiGroups: [ "apps" ] resources: [ "deployments" ] verbs: [ "get", "create", "delete" ] - apiGroups: [""] resources: ["services"] verbs: ["get", "list", "watch", "create", "delete"] - apiGroups: ["apps"] resources: ["daemonsets"] verbs: ["get", "create", "patch", "delete", "list"] - apiGroups: [""] resources: ["namespaces"] verbs: ["get", "list", "watch", "create", "delete"] - apiGroups: [""] resources: ["services/proxy"] verbs: ["get"] - apiGroups: [""] resources: ["configmaps"] verbs: ["get", "create", "delete"] - apiGroups: [""] resources: ["serviceaccounts"] verbs: ["get", "create", "delete"] - apiGroups: ["rbac.authorization.k8s.io"] resources: ["clusterroles"] verbs: ["get", "create", "delete"] - apiGroups: ["rbac.authorization.k8s.io"] resources: ["clusterrolebindings"] verbs: ["get", "create", "delete"] - apiGroups: ["rbac.authorization.k8s.io"] resources: ["roles"] verbs: ["get", "create", "delete"] - apiGroups: ["rbac.authorization.k8s.io"] resources: ["rolebindings"] verbs: ["get", "create", "delete"] - apiGroups: ["apps", "extensions"] resources: ["pods"] verbs: ["get", "list", "watch"] - apiGroups: ["apps", "extensions"] resources: ["services"] verbs: ["get", "list", "watch"] - apiGroups: ["", "apps", "extensions"] resources: ["endpoints"] verbs: ["get", "list", "watch"] - apiGroups: ["events.k8s.io"] resources: ["events"] verbs: ["list", "watch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: mizu-runner-clusterrolebindings subjects: - kind: User name: user1 apiGroup: rbac.authorization.k8s.io roleRef: kind: ClusterRole name: mizu-runner-clusterrole apiGroup: rbac.authorization.k8s.io