diff --git a/KubernetesDashboard/clusterrolebinding.yaml b/KubernetesDashboard/clusterrolebinding.yaml index feb349f..da6ebb9 100644 --- a/KubernetesDashboard/clusterrolebinding.yaml +++ b/KubernetesDashboard/clusterrolebinding.yaml @@ -1,11 +1,15 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: - name: axieyangb-clusteradmin + name: application-clusteradmin roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: -- kind: User - name: axieyangb@gmail.com \ No newline at end of file +- apiGroup: rbac.authorization.k8s.io + kind: User + name: axieyangb@gmail.com +- apiGroup: rbac.authorization.k8s.io + kind: User + name: jerxie.app@gmail.com \ No newline at end of file diff --git a/KubernetesDashboard/clusterrolebinding.yaml b/KubernetesDashboard/clusterrolebinding.yaml index feb349f..da6ebb9 100644 --- a/KubernetesDashboard/clusterrolebinding.yaml +++ b/KubernetesDashboard/clusterrolebinding.yaml @@ -1,11 +1,15 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: - name: axieyangb-clusteradmin + name: application-clusteradmin roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: -- kind: User - name: axieyangb@gmail.com \ No newline at end of file +- apiGroup: rbac.authorization.k8s.io + kind: User + name: axieyangb@gmail.com +- apiGroup: rbac.authorization.k8s.io + kind: User + name: jerxie.app@gmail.com \ No newline at end of file diff --git a/Misc/rolebinding_axieyangb.yaml b/Misc/rolebinding_axieyangb.yaml deleted file mode 100644 index 981ed08..0000000 --- a/Misc/rolebinding_axieyangb.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -# This role binding allows "dave" to read secrets in the "development" namespace. -# You need to already have a ClusterRole named "secret-reader". -kind: ClusterRoleBinding -metadata: - name: axieyangb-admin-role -subjects: -- kind: User - name: axieyangb@gmail.com # Name is case sensitive - apiGroup: rbac.authorization.k8s.io -roleRef: - kind: ClusterRole - name: admin - apiGroup: rbac.authorization.k8s.io