...
1apiVersion: v1
2items:
3- apiVersion: rbac.authorization.k8s.io/v1
4 kind: ClusterRoleBinding
5 metadata:
6 annotations:
7 rbac.authorization.kubernetes.io/autoupdate: "true"
8 creationTimestamp: null
9 labels:
10 kubernetes.io/bootstrapping: rbac-defaults
11 name: system:controller:attachdetach-controller
12 roleRef:
13 apiGroup: rbac.authorization.k8s.io
14 kind: ClusterRole
15 name: system:controller:attachdetach-controller
16 subjects:
17 - kind: ServiceAccount
18 name: attachdetach-controller
19 namespace: kube-system
20- apiVersion: rbac.authorization.k8s.io/v1
21 kind: ClusterRoleBinding
22 metadata:
23 annotations:
24 rbac.authorization.kubernetes.io/autoupdate: "true"
25 creationTimestamp: null
26 labels:
27 kubernetes.io/bootstrapping: rbac-defaults
28 name: system:controller:certificate-controller
29 roleRef:
30 apiGroup: rbac.authorization.k8s.io
31 kind: ClusterRole
32 name: system:controller:certificate-controller
33 subjects:
34 - kind: ServiceAccount
35 name: certificate-controller
36 namespace: kube-system
37- apiVersion: rbac.authorization.k8s.io/v1
38 kind: ClusterRoleBinding
39 metadata:
40 annotations:
41 rbac.authorization.kubernetes.io/autoupdate: "true"
42 creationTimestamp: null
43 labels:
44 kubernetes.io/bootstrapping: rbac-defaults
45 name: system:controller:clusterrole-aggregation-controller
46 roleRef:
47 apiGroup: rbac.authorization.k8s.io
48 kind: ClusterRole
49 name: system:controller:clusterrole-aggregation-controller
50 subjects:
51 - kind: ServiceAccount
52 name: clusterrole-aggregation-controller
53 namespace: kube-system
54- apiVersion: rbac.authorization.k8s.io/v1
55 kind: ClusterRoleBinding
56 metadata:
57 annotations:
58 rbac.authorization.kubernetes.io/autoupdate: "true"
59 creationTimestamp: null
60 labels:
61 kubernetes.io/bootstrapping: rbac-defaults
62 name: system:controller:cronjob-controller
63 roleRef:
64 apiGroup: rbac.authorization.k8s.io
65 kind: ClusterRole
66 name: system:controller:cronjob-controller
67 subjects:
68 - kind: ServiceAccount
69 name: cronjob-controller
70 namespace: kube-system
71- apiVersion: rbac.authorization.k8s.io/v1
72 kind: ClusterRoleBinding
73 metadata:
74 annotations:
75 rbac.authorization.kubernetes.io/autoupdate: "true"
76 creationTimestamp: null
77 labels:
78 kubernetes.io/bootstrapping: rbac-defaults
79 name: system:controller:daemon-set-controller
80 roleRef:
81 apiGroup: rbac.authorization.k8s.io
82 kind: ClusterRole
83 name: system:controller:daemon-set-controller
84 subjects:
85 - kind: ServiceAccount
86 name: daemon-set-controller
87 namespace: kube-system
88- apiVersion: rbac.authorization.k8s.io/v1
89 kind: ClusterRoleBinding
90 metadata:
91 annotations:
92 rbac.authorization.kubernetes.io/autoupdate: "true"
93 creationTimestamp: null
94 labels:
95 kubernetes.io/bootstrapping: rbac-defaults
96 name: system:controller:deployment-controller
97 roleRef:
98 apiGroup: rbac.authorization.k8s.io
99 kind: ClusterRole
100 name: system:controller:deployment-controller
101 subjects:
102 - kind: ServiceAccount
103 name: deployment-controller
104 namespace: kube-system
105- apiVersion: rbac.authorization.k8s.io/v1
106 kind: ClusterRoleBinding
107 metadata:
108 annotations:
109 rbac.authorization.kubernetes.io/autoupdate: "true"
110 creationTimestamp: null
111 labels:
112 kubernetes.io/bootstrapping: rbac-defaults
113 name: system:controller:disruption-controller
114 roleRef:
115 apiGroup: rbac.authorization.k8s.io
116 kind: ClusterRole
117 name: system:controller:disruption-controller
118 subjects:
119 - kind: ServiceAccount
120 name: disruption-controller
121 namespace: kube-system
122- apiVersion: rbac.authorization.k8s.io/v1
123 kind: ClusterRoleBinding
124 metadata:
125 annotations:
126 rbac.authorization.kubernetes.io/autoupdate: "true"
127 creationTimestamp: null
128 labels:
129 kubernetes.io/bootstrapping: rbac-defaults
130 name: system:controller:endpoint-controller
131 roleRef:
132 apiGroup: rbac.authorization.k8s.io
133 kind: ClusterRole
134 name: system:controller:endpoint-controller
135 subjects:
136 - kind: ServiceAccount
137 name: endpoint-controller
138 namespace: kube-system
139- apiVersion: rbac.authorization.k8s.io/v1
140 kind: ClusterRoleBinding
141 metadata:
142 annotations:
143 rbac.authorization.kubernetes.io/autoupdate: "true"
144 creationTimestamp: null
145 labels:
146 kubernetes.io/bootstrapping: rbac-defaults
147 name: system:controller:endpointslice-controller
148 roleRef:
149 apiGroup: rbac.authorization.k8s.io
150 kind: ClusterRole
151 name: system:controller:endpointslice-controller
152 subjects:
153 - kind: ServiceAccount
154 name: endpointslice-controller
155 namespace: kube-system
156- apiVersion: rbac.authorization.k8s.io/v1
157 kind: ClusterRoleBinding
158 metadata:
159 annotations:
160 rbac.authorization.kubernetes.io/autoupdate: "true"
161 creationTimestamp: null
162 labels:
163 kubernetes.io/bootstrapping: rbac-defaults
164 name: system:controller:endpointslicemirroring-controller
165 roleRef:
166 apiGroup: rbac.authorization.k8s.io
167 kind: ClusterRole
168 name: system:controller:endpointslicemirroring-controller
169 subjects:
170 - kind: ServiceAccount
171 name: endpointslicemirroring-controller
172 namespace: kube-system
173- apiVersion: rbac.authorization.k8s.io/v1
174 kind: ClusterRoleBinding
175 metadata:
176 annotations:
177 rbac.authorization.kubernetes.io/autoupdate: "true"
178 creationTimestamp: null
179 labels:
180 kubernetes.io/bootstrapping: rbac-defaults
181 name: system:controller:ephemeral-volume-controller
182 roleRef:
183 apiGroup: rbac.authorization.k8s.io
184 kind: ClusterRole
185 name: system:controller:ephemeral-volume-controller
186 subjects:
187 - kind: ServiceAccount
188 name: ephemeral-volume-controller
189 namespace: kube-system
190- apiVersion: rbac.authorization.k8s.io/v1
191 kind: ClusterRoleBinding
192 metadata:
193 annotations:
194 rbac.authorization.kubernetes.io/autoupdate: "true"
195 creationTimestamp: null
196 labels:
197 kubernetes.io/bootstrapping: rbac-defaults
198 name: system:controller:expand-controller
199 roleRef:
200 apiGroup: rbac.authorization.k8s.io
201 kind: ClusterRole
202 name: system:controller:expand-controller
203 subjects:
204 - kind: ServiceAccount
205 name: expand-controller
206 namespace: kube-system
207- apiVersion: rbac.authorization.k8s.io/v1
208 kind: ClusterRoleBinding
209 metadata:
210 annotations:
211 rbac.authorization.kubernetes.io/autoupdate: "true"
212 creationTimestamp: null
213 labels:
214 kubernetes.io/bootstrapping: rbac-defaults
215 name: system:controller:generic-garbage-collector
216 roleRef:
217 apiGroup: rbac.authorization.k8s.io
218 kind: ClusterRole
219 name: system:controller:generic-garbage-collector
220 subjects:
221 - kind: ServiceAccount
222 name: generic-garbage-collector
223 namespace: kube-system
224- apiVersion: rbac.authorization.k8s.io/v1
225 kind: ClusterRoleBinding
226 metadata:
227 annotations:
228 rbac.authorization.kubernetes.io/autoupdate: "true"
229 creationTimestamp: null
230 labels:
231 kubernetes.io/bootstrapping: rbac-defaults
232 name: system:controller:horizontal-pod-autoscaler
233 roleRef:
234 apiGroup: rbac.authorization.k8s.io
235 kind: ClusterRole
236 name: system:controller:horizontal-pod-autoscaler
237 subjects:
238 - kind: ServiceAccount
239 name: horizontal-pod-autoscaler
240 namespace: kube-system
241- apiVersion: rbac.authorization.k8s.io/v1
242 kind: ClusterRoleBinding
243 metadata:
244 annotations:
245 rbac.authorization.kubernetes.io/autoupdate: "true"
246 creationTimestamp: null
247 labels:
248 kubernetes.io/bootstrapping: rbac-defaults
249 name: system:controller:job-controller
250 roleRef:
251 apiGroup: rbac.authorization.k8s.io
252 kind: ClusterRole
253 name: system:controller:job-controller
254 subjects:
255 - kind: ServiceAccount
256 name: job-controller
257 namespace: kube-system
258- apiVersion: rbac.authorization.k8s.io/v1
259 kind: ClusterRoleBinding
260 metadata:
261 annotations:
262 rbac.authorization.kubernetes.io/autoupdate: "true"
263 creationTimestamp: null
264 labels:
265 kubernetes.io/bootstrapping: rbac-defaults
266 name: system:controller:legacy-service-account-token-cleaner
267 roleRef:
268 apiGroup: rbac.authorization.k8s.io
269 kind: ClusterRole
270 name: system:controller:legacy-service-account-token-cleaner
271 subjects:
272 - kind: ServiceAccount
273 name: legacy-service-account-token-cleaner
274 namespace: kube-system
275- apiVersion: rbac.authorization.k8s.io/v1
276 kind: ClusterRoleBinding
277 metadata:
278 annotations:
279 rbac.authorization.kubernetes.io/autoupdate: "true"
280 creationTimestamp: null
281 labels:
282 kubernetes.io/bootstrapping: rbac-defaults
283 name: system:controller:namespace-controller
284 roleRef:
285 apiGroup: rbac.authorization.k8s.io
286 kind: ClusterRole
287 name: system:controller:namespace-controller
288 subjects:
289 - kind: ServiceAccount
290 name: namespace-controller
291 namespace: kube-system
292- apiVersion: rbac.authorization.k8s.io/v1
293 kind: ClusterRoleBinding
294 metadata:
295 annotations:
296 rbac.authorization.kubernetes.io/autoupdate: "true"
297 creationTimestamp: null
298 labels:
299 kubernetes.io/bootstrapping: rbac-defaults
300 name: system:controller:node-controller
301 roleRef:
302 apiGroup: rbac.authorization.k8s.io
303 kind: ClusterRole
304 name: system:controller:node-controller
305 subjects:
306 - kind: ServiceAccount
307 name: node-controller
308 namespace: kube-system
309- apiVersion: rbac.authorization.k8s.io/v1
310 kind: ClusterRoleBinding
311 metadata:
312 annotations:
313 rbac.authorization.kubernetes.io/autoupdate: "true"
314 creationTimestamp: null
315 labels:
316 kubernetes.io/bootstrapping: rbac-defaults
317 name: system:controller:persistent-volume-binder
318 roleRef:
319 apiGroup: rbac.authorization.k8s.io
320 kind: ClusterRole
321 name: system:controller:persistent-volume-binder
322 subjects:
323 - kind: ServiceAccount
324 name: persistent-volume-binder
325 namespace: kube-system
326- apiVersion: rbac.authorization.k8s.io/v1
327 kind: ClusterRoleBinding
328 metadata:
329 annotations:
330 rbac.authorization.kubernetes.io/autoupdate: "true"
331 creationTimestamp: null
332 labels:
333 kubernetes.io/bootstrapping: rbac-defaults
334 name: system:controller:pod-garbage-collector
335 roleRef:
336 apiGroup: rbac.authorization.k8s.io
337 kind: ClusterRole
338 name: system:controller:pod-garbage-collector
339 subjects:
340 - kind: ServiceAccount
341 name: pod-garbage-collector
342 namespace: kube-system
343- apiVersion: rbac.authorization.k8s.io/v1
344 kind: ClusterRoleBinding
345 metadata:
346 annotations:
347 rbac.authorization.kubernetes.io/autoupdate: "true"
348 creationTimestamp: null
349 labels:
350 kubernetes.io/bootstrapping: rbac-defaults
351 name: system:controller:pv-protection-controller
352 roleRef:
353 apiGroup: rbac.authorization.k8s.io
354 kind: ClusterRole
355 name: system:controller:pv-protection-controller
356 subjects:
357 - kind: ServiceAccount
358 name: pv-protection-controller
359 namespace: kube-system
360- apiVersion: rbac.authorization.k8s.io/v1
361 kind: ClusterRoleBinding
362 metadata:
363 annotations:
364 rbac.authorization.kubernetes.io/autoupdate: "true"
365 creationTimestamp: null
366 labels:
367 kubernetes.io/bootstrapping: rbac-defaults
368 name: system:controller:pvc-protection-controller
369 roleRef:
370 apiGroup: rbac.authorization.k8s.io
371 kind: ClusterRole
372 name: system:controller:pvc-protection-controller
373 subjects:
374 - kind: ServiceAccount
375 name: pvc-protection-controller
376 namespace: kube-system
377- apiVersion: rbac.authorization.k8s.io/v1
378 kind: ClusterRoleBinding
379 metadata:
380 annotations:
381 rbac.authorization.kubernetes.io/autoupdate: "true"
382 creationTimestamp: null
383 labels:
384 kubernetes.io/bootstrapping: rbac-defaults
385 name: system:controller:replicaset-controller
386 roleRef:
387 apiGroup: rbac.authorization.k8s.io
388 kind: ClusterRole
389 name: system:controller:replicaset-controller
390 subjects:
391 - kind: ServiceAccount
392 name: replicaset-controller
393 namespace: kube-system
394- apiVersion: rbac.authorization.k8s.io/v1
395 kind: ClusterRoleBinding
396 metadata:
397 annotations:
398 rbac.authorization.kubernetes.io/autoupdate: "true"
399 creationTimestamp: null
400 labels:
401 kubernetes.io/bootstrapping: rbac-defaults
402 name: system:controller:replication-controller
403 roleRef:
404 apiGroup: rbac.authorization.k8s.io
405 kind: ClusterRole
406 name: system:controller:replication-controller
407 subjects:
408 - kind: ServiceAccount
409 name: replication-controller
410 namespace: kube-system
411- apiVersion: rbac.authorization.k8s.io/v1
412 kind: ClusterRoleBinding
413 metadata:
414 annotations:
415 rbac.authorization.kubernetes.io/autoupdate: "true"
416 creationTimestamp: null
417 labels:
418 kubernetes.io/bootstrapping: rbac-defaults
419 name: system:controller:resourcequota-controller
420 roleRef:
421 apiGroup: rbac.authorization.k8s.io
422 kind: ClusterRole
423 name: system:controller:resourcequota-controller
424 subjects:
425 - kind: ServiceAccount
426 name: resourcequota-controller
427 namespace: kube-system
428- apiVersion: rbac.authorization.k8s.io/v1
429 kind: ClusterRoleBinding
430 metadata:
431 annotations:
432 rbac.authorization.kubernetes.io/autoupdate: "true"
433 creationTimestamp: null
434 labels:
435 kubernetes.io/bootstrapping: rbac-defaults
436 name: system:controller:root-ca-cert-publisher
437 roleRef:
438 apiGroup: rbac.authorization.k8s.io
439 kind: ClusterRole
440 name: system:controller:root-ca-cert-publisher
441 subjects:
442 - kind: ServiceAccount
443 name: root-ca-cert-publisher
444 namespace: kube-system
445- apiVersion: rbac.authorization.k8s.io/v1
446 kind: ClusterRoleBinding
447 metadata:
448 annotations:
449 rbac.authorization.kubernetes.io/autoupdate: "true"
450 creationTimestamp: null
451 labels:
452 kubernetes.io/bootstrapping: rbac-defaults
453 name: system:controller:route-controller
454 roleRef:
455 apiGroup: rbac.authorization.k8s.io
456 kind: ClusterRole
457 name: system:controller:route-controller
458 subjects:
459 - kind: ServiceAccount
460 name: route-controller
461 namespace: kube-system
462- apiVersion: rbac.authorization.k8s.io/v1
463 kind: ClusterRoleBinding
464 metadata:
465 annotations:
466 rbac.authorization.kubernetes.io/autoupdate: "true"
467 creationTimestamp: null
468 labels:
469 kubernetes.io/bootstrapping: rbac-defaults
470 name: system:controller:service-account-controller
471 roleRef:
472 apiGroup: rbac.authorization.k8s.io
473 kind: ClusterRole
474 name: system:controller:service-account-controller
475 subjects:
476 - kind: ServiceAccount
477 name: service-account-controller
478 namespace: kube-system
479- apiVersion: rbac.authorization.k8s.io/v1
480 kind: ClusterRoleBinding
481 metadata:
482 annotations:
483 rbac.authorization.kubernetes.io/autoupdate: "true"
484 creationTimestamp: null
485 labels:
486 kubernetes.io/bootstrapping: rbac-defaults
487 name: system:controller:service-controller
488 roleRef:
489 apiGroup: rbac.authorization.k8s.io
490 kind: ClusterRole
491 name: system:controller:service-controller
492 subjects:
493 - kind: ServiceAccount
494 name: service-controller
495 namespace: kube-system
496- apiVersion: rbac.authorization.k8s.io/v1
497 kind: ClusterRoleBinding
498 metadata:
499 annotations:
500 rbac.authorization.kubernetes.io/autoupdate: "true"
501 creationTimestamp: null
502 labels:
503 kubernetes.io/bootstrapping: rbac-defaults
504 name: system:controller:statefulset-controller
505 roleRef:
506 apiGroup: rbac.authorization.k8s.io
507 kind: ClusterRole
508 name: system:controller:statefulset-controller
509 subjects:
510 - kind: ServiceAccount
511 name: statefulset-controller
512 namespace: kube-system
513- apiVersion: rbac.authorization.k8s.io/v1
514 kind: ClusterRoleBinding
515 metadata:
516 annotations:
517 rbac.authorization.kubernetes.io/autoupdate: "true"
518 creationTimestamp: null
519 labels:
520 kubernetes.io/bootstrapping: rbac-defaults
521 name: system:controller:ttl-after-finished-controller
522 roleRef:
523 apiGroup: rbac.authorization.k8s.io
524 kind: ClusterRole
525 name: system:controller:ttl-after-finished-controller
526 subjects:
527 - kind: ServiceAccount
528 name: ttl-after-finished-controller
529 namespace: kube-system
530- apiVersion: rbac.authorization.k8s.io/v1
531 kind: ClusterRoleBinding
532 metadata:
533 annotations:
534 rbac.authorization.kubernetes.io/autoupdate: "true"
535 creationTimestamp: null
536 labels:
537 kubernetes.io/bootstrapping: rbac-defaults
538 name: system:controller:ttl-controller
539 roleRef:
540 apiGroup: rbac.authorization.k8s.io
541 kind: ClusterRole
542 name: system:controller:ttl-controller
543 subjects:
544 - kind: ServiceAccount
545 name: ttl-controller
546 namespace: kube-system
547- apiVersion: rbac.authorization.k8s.io/v1
548 kind: ClusterRoleBinding
549 metadata:
550 annotations:
551 rbac.authorization.kubernetes.io/autoupdate: "true"
552 creationTimestamp: null
553 labels:
554 kubernetes.io/bootstrapping: rbac-defaults
555 name: system:controller:validatingadmissionpolicy-status-controller
556 roleRef:
557 apiGroup: rbac.authorization.k8s.io
558 kind: ClusterRole
559 name: system:controller:validatingadmissionpolicy-status-controller
560 subjects:
561 - kind: ServiceAccount
562 name: validatingadmissionpolicy-status-controller
563 namespace: kube-system
564kind: List
565metadata: {}
View as plain text