apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: cluster-role-binding roleRef: # profile-controller creates RoleBindings that give permissions in various # user namespaces.These permissions are defined in another ClusterRole and is # not known beforehand. Thus, profile-controller is using a more permissive # ClusterRole. apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - kind: ServiceAccount name: controller-service-account