@@ -2,23 +2,20 @@ apiVersion: v1
2
2
kind : Namespace
3
3
metadata :
4
4
name : choose-native-plants
5
-
6
5
---
7
-
8
6
apiVersion : v1
9
7
kind : ServiceAccount
10
8
metadata :
11
9
name : deployment-admin
12
10
namespace : choose-native-plants
13
-
14
11
---
15
-
16
12
kind : Role
17
13
apiVersion : rbac.authorization.k8s.io/v1
18
14
metadata :
19
15
name : deployment-admin
20
16
namespace : choose-native-plants
21
17
rules :
18
+ # Chris's original permissions (unchanged)
22
19
- apiGroups : [""]
23
20
resources : ["pods"]
24
21
verbs : ["get", "watch", "list", "delete"]
@@ -28,9 +25,32 @@ rules:
28
25
- apiGroups : [""]
29
26
resources : ["pods/log"]
30
27
verbs : ["get"]
31
-
28
+ # Additional read-only permissions for troubleshooting (Zach's need to troubleshoot prod)
29
+ - apiGroups : [""]
30
+ resources : ["events"]
31
+ verbs : ["get", "list", "watch"]
32
+ - apiGroups : ["apps", "extensions"]
33
+ resources : ["deployments", "replicasets", "statefulsets"]
34
+ verbs : ["get", "list", "watch"]
35
+ - apiGroups : [""]
36
+ resources : ["configmaps", "persistentvolumeclaims", "services"]
37
+ verbs : ["get", "list", "watch"]
38
+ - apiGroups : ["networking.k8s.io"]
39
+ resources : ["ingresses"]
40
+ verbs : ["get", "list", "watch"]
41
+ - apiGroups : [""]
42
+ resources : ["endpoints", "serviceaccounts"]
43
+ verbs : ["get", "list", "watch"]
44
+ - apiGroups : ["networking.k8s.io"]
45
+ resources : ["networkpolicies"]
46
+ verbs : ["get", "list", "watch"]
47
+ - apiGroups : ["batch"]
48
+ resources : ["jobs", "cronjobs"]
49
+ verbs : ["get", "list", "watch"]
50
+ - apiGroups : ["rbac.authorization.k8s.io"]
51
+ resources : ["roles", "rolebindings"]
52
+ verbs : ["get", "list", "watch"]
32
53
---
33
-
34
54
kind : RoleBinding
35
55
apiVersion : rbac.authorization.k8s.io/v1
36
56
metadata :
@@ -43,4 +63,4 @@ subjects:
43
63
roleRef :
44
64
apiGroup : rbac.authorization.k8s.io
45
65
kind : Role
46
- name : deployment-admin
66
+ name : deployment-admin
0 commit comments