EKS specific RBAC considerations
Create a cluster role binding of the cluster role and the user/service account.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: csw-clusterrolebinging
subjects:
- kind: User
name: csw.read.only
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: csw.read.only
apiGroup: rbac.authorization.k8s.io
kubectl create -f clusterrolebinding.yaml
clusterrolebinding.rbac.authorization.k8s.io/csw-clusterrolebinging created
For information on EKS roles and access, see the EKS Roles and Access Privileges section.