---apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:name: admin-viewonly
rules:-apiGroups:-""resources:- configmaps
- endpoints
- persistentvolumeclaims
- pods
- replicationcontrollers
- replicationcontrollers/scale
- serviceaccounts
- services
- nodes
- persistentvolumeclaims
- persistentvolumes
verbs:- get
- list
- watch
-apiGroups:-""resources:- bindings
- events
- limitranges
- namespaces/status
- pods/log
- pods/status
- replicationcontrollers/status
- resourcequotas
- resourcequotas/status
verbs:- get
- list
- watch
-apiGroups:-""resources:- namespaces
verbs:- get
- list
- watch
-apiGroups:- apps
resources:- daemonsets
- deployments
- deployments/scale
- replicasets
- replicasets/scale
- statefulsets
verbs:- get
- list
- watch
-apiGroups:- autoscaling
resources:- horizontalpodautoscalers
verbs:- get
- list
- watch
-apiGroups:- batch
resources:- cronjobs
- jobs
verbs:- get
- list
- watch
-apiGroups:- extensions
resources:- daemonsets
- deployments
- deployments/scale
- ingresses
- networkpolicies
- replicasets
- replicasets/scale
- replicationcontrollers/scale
verbs:- get
- list
- watch
-apiGroups:- policy
resources:- poddisruptionbudgets
verbs:- get
- list
- watch
-apiGroups:- networking.k8s.io
resources:- networkpolicies
verbs:- get
- list
- watch
-apiGroups:- storage.k8s.io
resources:- storageclasses
- volumeattachments
verbs:- get
- list
- watch
-apiGroups:- rbac.authorization.k8s.io
resources:- clusterrolebindings
- clusterroles
- roles
- rolebindings
verbs:- get
- list
- watch
---apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:name: admin-viewonly
labels:k8s-app: admin-viewonly
roleRef:apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: admin-viewonly
subjects:-kind: ServiceAccount
name: admin-viewonly
namespace: kube-system
---apiVersion: v1
kind: ServiceAccount
metadata:name: admin-viewonly
namespace: kube-system
labels:kubernetes.io/cluster-service:"true"addonmanager.kubernetes.io/mode: Reconcile
创建只读账号
kubectl create -f viewonly-sa.yaml
clusterrole.rbac.authorization.k8s.io/admin-viewonly created
clusterrolebinding.rbac.authorization.k8s.io/admin-viewonly created
serviceaccount/admin-viewonly created
查看admin-viewonly账号
kubectl get secret -n kube-system|grep admin-viewonly