apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: k3s-cloud-controller-manager rules: - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - create - update - apiGroups: - "" resources: - events verbs: - create - patch - update - apiGroups: - "" resources: - nodes verbs: - "*" - apiGroups: - "" resources: - nodes/status - services/status verbs: - patch - apiGroups: - "" resources: - services - pods verbs: - get - list - watch - apiGroups: - "" resources: - services verbs: - patch - update - apiGroups: - "" resources: - serviceaccounts verbs: - create - apiGroups: - "" resources: - namespaces verbs: - create - get - apiGroups: - apps resources: - daemonsets verbs: - "*" --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: k3s-cloud-controller-manager roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: k3s-cloud-controller-manager subjects: - kind: User name: k3s-cloud-controller-manager namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: k3s-cloud-controller-manager-auth-delegator roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - kind: User name: k3s-cloud-controller-manager namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: k3s-cloud-controller-manager-authentication-reader namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: extension-apiserver-authentication-reader subjects: - kind: User name: k3s-cloud-controller-manager namespace: kube-system