apiVersion: v1 items: - apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:bootstrap-signer namespace: kube-public roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:controller:bootstrap-signer subjects: - kind: ServiceAccount name: bootstrap-signer namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system::extension-apiserver-authentication-reader namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: extension-apiserver-authentication-reader subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: system:kube-controller-manager - apiGroup: rbac.authorization.k8s.io kind: User name: system:kube-scheduler - apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system::leader-locking-kube-controller-manager namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system::leader-locking-kube-controller-manager subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: system:kube-controller-manager - kind: ServiceAccount name: kube-controller-manager namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system::leader-locking-kube-scheduler namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system::leader-locking-kube-scheduler subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: system:kube-scheduler - kind: ServiceAccount name: kube-scheduler namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:bootstrap-signer namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:controller:bootstrap-signer subjects: - kind: ServiceAccount name: bootstrap-signer namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:cloud-provider namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:controller:cloud-provider subjects: - kind: ServiceAccount name: cloud-provider namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:token-cleaner namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:controller:token-cleaner subjects: - kind: ServiceAccount name: token-cleaner namespace: kube-system kind: List metadata: {}