apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kube-apiserver-kubelet-admin roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:kubelet-api-admin subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: kube-apiserver --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: system:k3s-controller rules: - apiGroups: - "" resources: - nodes verbs: - get - apiGroups: - "" resources: - namespaces verbs: - list - watch - apiGroups: - "networking.k8s.io" resources: - networkpolicies - clustercidrs verbs: - list - watch - apiGroups: - "" resources: - endpoints - pods verbs: - list - get - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:k3s-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:k3s-controller subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: system:k3s-controller --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: clustercidrs-node rules: - apiGroups: - networking.k8s.io resources: - clustercidrs verbs: - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: clustercidrs-node roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: clustercidrs-node subjects: - kind: Group name: system:nodes apiGroup: rbac.authorization.k8s.io