traefik-rbac.yaml 1.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465
  1. apiVersion: rbac.authorization.k8s.io/v1
  2. kind: ClusterRole
  3. metadata:
  4. name: traefik-ingress-controller
  5. rules:
  6. - apiGroups:
  7. - ""
  8. resources:
  9. - services
  10. - endpoints
  11. - secrets
  12. verbs:
  13. - get
  14. - list
  15. - watch
  16. - apiGroups:
  17. - extensions
  18. - networking.k8s.io
  19. resources:
  20. - ingresses
  21. - ingressclasses
  22. verbs:
  23. - get
  24. - list
  25. - watch
  26. - apiGroups:
  27. - extensions
  28. - networking.k8s.io
  29. resources:
  30. - ingresses/status
  31. verbs:
  32. - update
  33. - apiGroups:
  34. - traefik.io
  35. - traefik.containo.us
  36. resources:
  37. - middlewares
  38. - middlewaretcps
  39. - ingressroutes
  40. - traefikservices
  41. - ingressroutetcps
  42. - ingressrouteudps
  43. - tlsoptions
  44. - tlsstores
  45. - serverstransports
  46. verbs:
  47. - get
  48. - list
  49. - watch
  50. ---
  51. apiVersion: rbac.authorization.k8s.io/v1
  52. kind: ClusterRoleBinding
  53. metadata:
  54. name: traefik-ingress-controller
  55. roleRef:
  56. apiGroup: rbac.authorization.k8s.io
  57. kind: ClusterRole
  58. name: traefik-ingress-controller
  59. subjects:
  60. - kind: ServiceAccount
  61. name: traefik-ingress-controller
  62. namespace: default