...
Code Block |
---|
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cloudaware-reader rules: - apiGroups: ["*"] resources: ["*"] verbs: ["get", "watch", "list"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: <SAMPLEcloudaware-reader-ROLEapplication-BINDING>binding roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cloudaware-reader subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: <SERVICE-PRINCIPAL-OBJECT-ID> |
WHERE
in ClusterRole:
ClusterRole
cloudaware-reader grants Cloudaware the read access to all resources within the cluster.
in ClusterRoleBinding:<SAMPLE-ROLE-BINDING> in metadata
is a placeholder that needs to be replaced by your Cluster Role Binding name
ClusterRoleBinding
cloudaware-reader-application-binding grants Cloudaware Cluster Role the read access to Azure Application.
<SERVICE-PRINCIPAL-OBJECT-ID> insubjects
is a placeholder that needs to be replaced by your Azure Application Object ID.
3. Run the following command:
...