apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: external-dns-operator namespace: external-dns rules: - apiGroups: - "" resources: - serviceaccounts - secrets - configmaps verbs: - get - list - watch - create - update - delete - apiGroups: - "" resources: - namespaces verbs: - get - list - watch - apiGroups: - apps resources: - deployments verbs: - get - list - watch - create - update - delete --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: external-dns-operator namespace: external-dns roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: external-dns-operator subjects: - kind: ServiceAccount name: external-dns-operator namespace: external-dns-operator --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: external-dns rules: - apiGroups: - networking.k8s.io resources: - ingresses verbs: - get - list - watch - apiGroups: - "" resources: - endpoints - services - pods - nodes verbs: - get - list - watch - apiGroups: - route.openshift.io resources: - routes verbs: - get - watch - list --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: external-dns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: external-dns subjects: - kind: Group name: system:serviceaccounts:external-dns namespace: external-dns