Skip to content

Instantly share code, notes, and snippets.

@strideynet
Created January 17, 2020 16:18
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save strideynet/067b55063cddc2dac6b3c4c6ff4db87a to your computer and use it in GitHub Desktop.
Save strideynet/067b55063cddc2dac6b3c4c6ff4db87a to your computer and use it in GitHub Desktop.
apiVersion: rbac.authorization.k8s.io/v1
# This cluster role binding allows anyone in the "manager" group to read secrets in any namespace.
kind: ClusterRoleBinding
metadata:
name: ClusterAdminCudoDev
subjects:
- kind: Group
name: oidcdev@cudoventures.com
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: cluster-admin
apiGroup: rbac.authorization.k8s.io
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment