apiVersion: v1 items: - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:attachdetach-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:attachdetach-controller subjects: - kind: ServiceAccount name: attachdetach-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:certificate-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:certificate-controller subjects: - kind: ServiceAccount name: certificate-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:clusterrole-aggregation-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:clusterrole-aggregation-controller subjects: - kind: ServiceAccount name: clusterrole-aggregation-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:cronjob-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:cronjob-controller subjects: - kind: ServiceAccount name: cronjob-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:daemon-set-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:daemon-set-controller subjects: - kind: ServiceAccount name: daemon-set-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:deployment-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:deployment-controller subjects: - kind: ServiceAccount name: deployment-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:disruption-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:disruption-controller subjects: - kind: ServiceAccount name: disruption-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:endpoint-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:endpoint-controller subjects: - kind: ServiceAccount name: endpoint-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:endpointslice-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:endpointslice-controller subjects: - kind: ServiceAccount name: endpointslice-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:endpointslicemirroring-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:endpointslicemirroring-controller subjects: - kind: ServiceAccount name: endpointslicemirroring-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:ephemeral-volume-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:ephemeral-volume-controller subjects: - kind: ServiceAccount name: ephemeral-volume-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:expand-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:expand-controller subjects: - kind: ServiceAccount name: expand-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:generic-garbage-collector roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:generic-garbage-collector subjects: - kind: ServiceAccount name: generic-garbage-collector namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:horizontal-pod-autoscaler roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:horizontal-pod-autoscaler subjects: - kind: ServiceAccount name: horizontal-pod-autoscaler namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:job-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:job-controller subjects: - kind: ServiceAccount name: job-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:legacy-service-account-token-cleaner roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:legacy-service-account-token-cleaner subjects: - kind: ServiceAccount name: legacy-service-account-token-cleaner namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:namespace-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:namespace-controller subjects: - kind: ServiceAccount name: namespace-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:node-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:node-controller subjects: - kind: ServiceAccount name: node-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:persistent-volume-binder roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:persistent-volume-binder subjects: - kind: ServiceAccount name: persistent-volume-binder namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:pod-garbage-collector roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:pod-garbage-collector subjects: - kind: ServiceAccount name: pod-garbage-collector namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:pv-protection-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:pv-protection-controller subjects: - kind: ServiceAccount name: pv-protection-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:pvc-protection-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:pvc-protection-controller subjects: - kind: ServiceAccount name: pvc-protection-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:replicaset-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:replicaset-controller subjects: - kind: ServiceAccount name: replicaset-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:replication-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:replication-controller subjects: - kind: ServiceAccount name: replication-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:resourcequota-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:resourcequota-controller subjects: - kind: ServiceAccount name: resourcequota-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:root-ca-cert-publisher roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:root-ca-cert-publisher subjects: - kind: ServiceAccount name: root-ca-cert-publisher namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:route-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:route-controller subjects: - kind: ServiceAccount name: route-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:service-account-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:service-account-controller subjects: - kind: ServiceAccount name: service-account-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:service-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:service-controller subjects: - kind: ServiceAccount name: service-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:statefulset-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:statefulset-controller subjects: - kind: ServiceAccount name: statefulset-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:ttl-after-finished-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:ttl-after-finished-controller subjects: - kind: ServiceAccount name: ttl-after-finished-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:ttl-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:ttl-controller subjects: - kind: ServiceAccount name: ttl-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:validatingadmissionpolicy-status-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:validatingadmissionpolicy-status-controller subjects: - kind: ServiceAccount name: validatingadmissionpolicy-status-controller namespace: kube-system kind: List metadata: {}