github.com/pachyderm/pachyderm@v1.13.4/examples/traefik-ingress/roles.yaml (about) 1 --- 2 kind: ClusterRole 3 apiVersion: rbac.authorization.k8s.io/v1beta1 4 metadata: 5 name: traefik-ingress-controller 6 rules: 7 - apiGroups: 8 - "" 9 resources: 10 - services 11 - endpoints 12 - secrets 13 verbs: 14 - get 15 - list 16 - watch 17 - apiGroups: 18 - extensions 19 resources: 20 - ingresses 21 verbs: 22 - get 23 - list 24 - watch 25 - apiGroups: 26 - extensions 27 resources: 28 - ingresses/status 29 verbs: 30 - update 31 --- 32 kind: ClusterRoleBinding 33 apiVersion: rbac.authorization.k8s.io/v1beta1 34 metadata: 35 name: traefik-ingress-controller 36 roleRef: 37 apiGroup: rbac.authorization.k8s.io 38 kind: ClusterRole 39 name: traefik-ingress-controller 40 subjects: 41 - kind: ServiceAccount 42 name: traefik-ingress-controller 43 namespace: kube-system