| apiVersion: v1 |
| items: |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:attachdetach-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:attachdetach-controller |
| subjects: |
| - kind: ServiceAccount |
| name: attachdetach-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:certificate-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:certificate-controller |
| subjects: |
| - kind: ServiceAccount |
| name: certificate-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:clusterrole-aggregation-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:clusterrole-aggregation-controller |
| subjects: |
| - kind: ServiceAccount |
| name: clusterrole-aggregation-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:cronjob-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:cronjob-controller |
| subjects: |
| - kind: ServiceAccount |
| name: cronjob-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:daemon-set-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:daemon-set-controller |
| subjects: |
| - kind: ServiceAccount |
| name: daemon-set-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:deployment-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:deployment-controller |
| subjects: |
| - kind: ServiceAccount |
| name: deployment-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:disruption-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:disruption-controller |
| subjects: |
| - kind: ServiceAccount |
| name: disruption-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:endpoint-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:endpoint-controller |
| subjects: |
| - kind: ServiceAccount |
| name: endpoint-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:expand-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:expand-controller |
| subjects: |
| - kind: ServiceAccount |
| name: expand-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:generic-garbage-collector |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:generic-garbage-collector |
| subjects: |
| - kind: ServiceAccount |
| name: generic-garbage-collector |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:horizontal-pod-autoscaler |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:horizontal-pod-autoscaler |
| subjects: |
| - kind: ServiceAccount |
| name: horizontal-pod-autoscaler |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:job-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:job-controller |
| subjects: |
| - kind: ServiceAccount |
| name: job-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:namespace-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:namespace-controller |
| subjects: |
| - kind: ServiceAccount |
| name: namespace-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:node-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:node-controller |
| subjects: |
| - kind: ServiceAccount |
| name: node-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:persistent-volume-binder |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:persistent-volume-binder |
| subjects: |
| - kind: ServiceAccount |
| name: persistent-volume-binder |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:pod-garbage-collector |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:pod-garbage-collector |
| subjects: |
| - kind: ServiceAccount |
| name: pod-garbage-collector |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:pv-protection-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:pv-protection-controller |
| subjects: |
| - kind: ServiceAccount |
| name: pv-protection-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:pvc-protection-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:pvc-protection-controller |
| subjects: |
| - kind: ServiceAccount |
| name: pvc-protection-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:replicaset-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:replicaset-controller |
| subjects: |
| - kind: ServiceAccount |
| name: replicaset-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:replication-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:replication-controller |
| subjects: |
| - kind: ServiceAccount |
| name: replication-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:resourcequota-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:resourcequota-controller |
| subjects: |
| - kind: ServiceAccount |
| name: resourcequota-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:root-ca-cert-publisher |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:root-ca-cert-publisher |
| subjects: |
| - kind: ServiceAccount |
| name: root-ca-cert-publisher |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:route-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:route-controller |
| subjects: |
| - kind: ServiceAccount |
| name: route-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:service-account-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:service-account-controller |
| subjects: |
| - kind: ServiceAccount |
| name: service-account-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:service-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:service-controller |
| subjects: |
| - kind: ServiceAccount |
| name: service-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:statefulset-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:statefulset-controller |
| subjects: |
| - kind: ServiceAccount |
| name: statefulset-controller |
| namespace: kube-system |
| - apiVersion: rbac.authorization.k8s.io/v1 |
| kind: ClusterRoleBinding |
| metadata: |
| annotations: |
| rbac.authorization.kubernetes.io/autoupdate: "true" |
| creationTimestamp: null |
| labels: |
| kubernetes.io/bootstrapping: rbac-defaults |
| name: system:controller:ttl-controller |
| roleRef: |
| apiGroup: rbac.authorization.k8s.io |
| kind: ClusterRole |
| name: system:controller:ttl-controller |
| subjects: |
| - kind: ServiceAccount |
| name: ttl-controller |
| namespace: kube-system |
| kind: List |
| metadata: {} |