apiVersion: rbac.authorization.k8s.io/v1 # This role binding allows "dave" to read secrets in the "development" namespace. # You need to already have a ClusterRole named "secret-reader". kind: ClusterRoleBinding metadata: name: axieyangb-admin-role subjects: - kind: User name: axieyangb@gmail.com # Name is case sensitive apiGroup: rbac.authorization.k8s.io roleRef: kind: ClusterRole name: admin apiGroup: rbac.authorization.k8s.io