@@ -2,23 +2,20 @@ apiVersion: v1
22kind : Namespace
33metadata :
44 name : choose-native-plants
5-
65---
7-
86apiVersion : v1
97kind : ServiceAccount
108metadata :
119 name : deployment-admin
1210 namespace : choose-native-plants
13-
1411---
15-
1612kind : Role
1713apiVersion : rbac.authorization.k8s.io/v1
1814metadata :
1915 name : deployment-admin
2016 namespace : choose-native-plants
2117rules :
18+ # Chris's original permissions (unchanged)
2219- apiGroups : [""]
2320 resources : ["pods"]
2421 verbs : ["get", "watch", "list", "delete"]
@@ -28,9 +25,32 @@ rules:
2825- apiGroups : [""]
2926 resources : ["pods/log"]
3027 verbs : ["get"]
31-
28+ # Additional read-only permissions for troubleshooting (Zach's need to troubleshoot prod)
29+ - apiGroups : [""]
30+ resources : ["events"]
31+ verbs : ["get", "list", "watch"]
32+ - apiGroups : ["apps", "extensions"]
33+ resources : ["deployments", "replicasets", "statefulsets"]
34+ verbs : ["get", "list", "watch"]
35+ - apiGroups : [""]
36+ resources : ["configmaps", "persistentvolumeclaims", "services"]
37+ verbs : ["get", "list", "watch"]
38+ - apiGroups : ["networking.k8s.io"]
39+ resources : ["ingresses"]
40+ verbs : ["get", "list", "watch"]
41+ - apiGroups : [""]
42+ resources : ["endpoints", "serviceaccounts"]
43+ verbs : ["get", "list", "watch"]
44+ - apiGroups : ["networking.k8s.io"]
45+ resources : ["networkpolicies"]
46+ verbs : ["get", "list", "watch"]
47+ - apiGroups : ["batch"]
48+ resources : ["jobs", "cronjobs"]
49+ verbs : ["get", "list", "watch"]
50+ - apiGroups : ["rbac.authorization.k8s.io"]
51+ resources : ["roles", "rolebindings"]
52+ verbs : ["get", "list", "watch"]
3253---
33-
3454kind : RoleBinding
3555apiVersion : rbac.authorization.k8s.io/v1
3656metadata :
@@ -43,4 +63,4 @@ subjects:
4363roleRef :
4464 apiGroup : rbac.authorization.k8s.io
4565 kind : Role
46- name : deployment-admin
66+ name : deployment-admin
0 commit comments