Kubespec Logo kubespec.dev

rbac.authorization.k8s.io/v1

Namespaced Resource

RoleBinding

        RoleBinding references a role, but does not contain it.  It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in.  RoleBindings in a given namespace only have effect in that namespace.
      

Click on Property Name to show the description, and Pink Types to expand schema.

Required properties are marked with *

Change History

Kubernetes v1.32

Kubernetes v1.31

Kubernetes v1.30

Kubernetes v1.29

Kubernetes v1.28

~1

Kubernetes v1.27

~7

Kubernetes v1.26

Kubernetes v1.25

-1

Kubernetes v1.24

~5

Kubernetes v1.23

Kubernetes v1.22

+1

Kubernetes v1.21

Kubernetes v1.20

Kubernetes v1.19

~1

Kubernetes v1.18

Kubernetes v1.17

~1

Kubernetes v1.16

+2-2~9

Kubernetes v1.15

+1

Kubernetes v1.14

+1~1

Kubernetes v1.13

Kubernetes v1.12

~1

Kubernetes v1.11

Examples

There are 4 examples of RoleBinding that you can use as a starting point to create your own.

apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
  name: pod-reader-role-binding-alice
  namespace: dev # RoleBinding is a namespaced resource
roleRef:
  apiGroup: rbac.authorization.k8s.io
  name: pod-reader-role-alice
  kind: Role
subjects:
  - kind: User
    name: Alice
    namespace: dev

Other useful resources