apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: bunkerized-nginx-ingress-controller rules: - apiGroups: [""] resources: ["services", "pods"] verbs: ["get", "watch", "list"] - apiGroups: ["extensions"] resources: ["ingresses"] verbs: ["get", "watch", "list"] --- apiVersion: v1 kind: ServiceAccount metadata: name: bunkerized-nginx-ingress-controller --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: bunkerized-nginx-ingress-controller subjects: - kind: ServiceAccount name: bunkerized-nginx-ingress-controller namespace: default apiGroup: "" roleRef: kind: ClusterRole name: bunkerized-nginx-ingress-controller apiGroup: rbac.authorization.k8s.io