Kubespec Logo kubespec.dev

rbac.authorization.k8s.io/v1

Cluster-scoped Resource

ClusterRoleBinding

        ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace, and adds who information via Subject.
      

Click on Property Name to show the description, and Pink Types to expand schema.

Required properties are marked with *

Change History

Kubernetes v1.32

Kubernetes v1.31

Kubernetes v1.30

Kubernetes v1.29

Kubernetes v1.28

~1

Kubernetes v1.27

~7

Kubernetes v1.26

Kubernetes v1.25

-1

Kubernetes v1.24

~5

Kubernetes v1.23

Kubernetes v1.22

+1

Kubernetes v1.21

Kubernetes v1.20

Kubernetes v1.19

~1

Kubernetes v1.18

Kubernetes v1.17

~1

Kubernetes v1.16

+2-2~9

Kubernetes v1.15

+1

Kubernetes v1.14

+1~1

Kubernetes v1.13

Kubernetes v1.12

~1

Kubernetes v1.11

Examples

There is 1 example of ClusterRoleBinding that you can use as a starting point to create your own.


apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  name: read-secrets-global
subjects:
- kind: User
  name: Bob # Name is case sensitive
  apiGroup: rbac.authorization.k8s.io
roleRef:
  kind: ClusterRole
  name: secret-reader
  apiGroup: rbac.authorization.k8s.io
  

Other useful resources