simple.yaml --- apiVersion: rbac.authorization.k8s.io/v1 # This cluster role binding allows anyone in the "manager" group to # read secrets in any namespace. kind: ClusterRoleBinding metadata: name: cluster-role-binding-clusterrolebinding-simple subjects: - kind: Group name: manager # Name is case sensitive apiGroup: rbac.authorization.k8s.io roleRef: kind: ClusterRole name: cluster-role-binding-clusterrole-simple apiGroup: rbac.authorization.k8s.io --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: # "namespace" omitted since ClusterRoles are not namespaced name: cluster-role-binding-clusterrole-simple rules: - apiGroups: [""] # at the HTTP level, the name of the resource for accessing Secret # objects is "secrets" resources: ["secrets"] verbs: ["get", "watch", "list"] https://kubernetes.io/docs/reference/access-authn-authz/rbac/