RBACCluster Role Bindings

Cluster Role Bindings

Cluster Role Bindings grant the permissions defined in a Cluster Role to users, groups, or service accounts across the entire cluster.

Cluster Role Bindings Overview
Cluster Role Bindings management interface showing cluster-wide role assignments

Overview

The Cluster Role Bindings view displays all bindings with the following information:

ColumnDescription
NameThe binding identifier
Role ReferenceThe Cluster Role being granted (clickable link)
SubjectsNumber of users/groups/service accounts bound
Bound ToThe specific subjects that have this role
AgeWhen the binding was created
ActionsEdit or delete the binding

Features

Use the search bar to quickly find bindings by name.

Create Cluster Role Binding

Click + Create Cluster Role Binding to assign a cluster role to subjects.

Creating a Cluster Role Binding

When creating a binding, you’ll specify:

  1. Name - A unique identifier for the binding
  2. Cluster Role - The cluster role to grant
  3. Subjects - Who receives the permissions:
    • User - A specific user (e.g., [email protected])
    • Group - A group of users (e.g., developers)
    • Service Account - A service account in a specific namespace

Example Cluster Role Binding

Grant the node-reader cluster role to a group:

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  name: read-nodes-global
subjects:
- kind: Group
  name: "ops-team"
  apiGroup: rbac.authorization.k8s.io
roleRef:
  kind: ClusterRole
  name: node-reader
  apiGroup: rbac.authorization.k8s.io

Subjects Types

Subject KindDescriptionExample
UserIndividual user identity[email protected]
GroupCollection of userssystem:masters, developers
ServiceAccountPod identitydefault:my-service-account

Common Patterns

Grant Admin Access to a User

subjects:
- kind: User
  name: "[email protected]"
  apiGroup: rbac.authorization.k8s.io
roleRef:
  kind: ClusterRole
  name: cluster-admin

Grant View Access to All Authenticated Users

subjects:
- kind: Group
  name: "system:authenticated"
  apiGroup: rbac.authorization.k8s.io
roleRef:
  kind: ClusterRole
  name: view

Best Practices

  1. Use groups over users - Easier to manage as team membership changes
  2. Avoid binding cluster-admin - Use more restrictive roles when possible
  3. Document bindings - Track why each binding exists
  4. Regular reviews - Remove bindings when users leave or change roles