apiVersion: v1 kind: ServiceAccount metadata: name: jumpserver-admin namespace: test --- kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: name: jumpserver-admin-role namespace: test rules: - apiGroups: [""] resources: ["pods", "services", "configmaps", "secrets"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] - apiGroups: ["apps"] resources: ["deployments", "replicasets"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: jumpserver-admin-rolebinding namespace: test subjects: - kind: ServiceAccount name: jumpserver-admin namespace: test roleRef: kind: Role name: jumpserver-admin-role apiGroup: rbac.authorization.k8s.io --- apiVersion: v1 kind: Secret metadata: name: jumpserver-admin namespace: test annotations: kubernetes.io/service-account.name: "jumpserver-admin" type: kubernetes.io/service-account-token