apiVersion: v1 kind: Namespace metadata: name: kube-ingress --- apiVersion: v1 kind: ServiceAccount metadata: name: kube-nginx-ingress namespace: kube-ingress --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: name: kube-nginx-ingress rules: - apiGroups: - "" resources: - configmaps - endpoints - nodes - pods - secrets verbs: - list - watch - update - apiGroups: - "" resources: - nodes verbs: - get - apiGroups: - "" resources: - services verbs: - get - list - watch - apiGroups: - "extensions" resources: - ingresses verbs: - get - list - watch - apiGroups: - "" resources: - events verbs: - create - patch - apiGroups: - "extensions" resources: - ingresses/status verbs: - update --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: Role metadata: name: kube-nginx-ingress namespace: kube-ingress rules: - apiGroups: - "" resources: - configmaps - pods - secrets - namespaces verbs: - get - apiGroups: - "" resources: - configmaps resourceNames: - "ingress-controller-leader-nginx" verbs: - get - update - apiGroups: - "" resources: - configmaps verbs: - create - apiGroups: - "" resources: - endpoints verbs: - get - create - update --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: RoleBinding metadata: name: kube-nginx-ingress namespace: kube-ingress roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: kube-nginx-ingress subjects: - kind: ServiceAccount name: kube-nginx-ingress namespace: kube-ingress --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: kube-nginx-ingress roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: kube-nginx-ingress subjects: - kind: ServiceAccount name: kube-nginx-ingress namespace: kube-ingress