| apiVersion: v1 |
| items: |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: cluster-admin |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: cluster-admin |
| subjects: |
| - apiGroup: rbac.authorization.k8s.io |
| kind: Group |
| name: system:masters |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:aws-cloud-provider |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:aws-cloud-provider |
| subjects: |
| - kind: ServiceAccount |
| name: aws-cloud-provider |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:basic-user |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:basic-user |
| subjects: |
| - apiGroup: rbac.authorization.k8s.io |
| kind: Group |
| name: system:authenticated |
| - apiGroup: rbac.authorization.k8s.io |
| kind: Group |
| name: system:unauthenticated |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:discovery |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:discovery |
| subjects: |
| - apiGroup: rbac.authorization.k8s.io |
| kind: Group |
| name: system:authenticated |
| - apiGroup: rbac.authorization.k8s.io |
| kind: Group |
| name: system:unauthenticated |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:kube-controller-manager |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:kube-controller-manager |
| subjects: |
| - apiGroup: rbac.authorization.k8s.io |
| kind: User |
| name: system:kube-controller-manager |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:kube-dns |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:kube-dns |
| subjects: |
| - kind: ServiceAccount |
| name: kube-dns |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:kube-scheduler |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:kube-scheduler |
| subjects: |
| - apiGroup: rbac.authorization.k8s.io |
| kind: User |
| name: system:kube-scheduler |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:node |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:node |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:node-proxier |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:node-proxier |
| subjects: |
| - apiGroup: rbac.authorization.k8s.io |
| kind: User |
| name: system:kube-proxy |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:volume-scheduler |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:volume-scheduler |
| subjects: |
| - apiGroup: rbac.authorization.k8s.io |
| kind: User |
| name: system:kube-scheduler |
| kind: List |
| metadata: {} |