# Access for the service account kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: control-cdb rules: - apiGroups: ["coredb.io"] resources: ["coredbs", "coredbs/status"] verbs: ["get", "list", "watch", "patch", "update"] - apiGroups: ["events.k8s.io"] resources: ["events"] verbs: ["create"] - apiGroups: [""] resources: ["persistentvolumeclaims"] verbs: ["get", "list", "patch"] - apiGroups: ["apps"] resources: ["statefulsets"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] - apiGroups: [""] resources: ["services", "secrets", "pods", "pods/exec", "namespaces/status", "serviceaccounts", "secrets", "configmaps"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] - apiGroups: ["rbac.authorization.k8s.io"] resources: ["roles", "rolebindings"] verbs: ["create", "delete", "get", "list", "patch", "update", "watch"] - apiGroups: ["batch"] resources: ["cronjobs"] verbs: ["create", "delete", "get", "list", "patch", "update", "watch"]