# infrastructure/traefik/clusterrole.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: traefik-ingress-controller rules: - apiGroups: - "" resources: - services - endpoints - secrets - nodes verbs: - get - list - watch - apiGroups: - extensions - networking.k8s.io resources: - ingresses verbs: - get - list - watch - apiGroups: - traefik.containo.us resources: - middlewares - ingressroutes - ingressroutetcps - ingressrouteudps - tlsoptions - tlsstores verbs: - get - list - watch - apiGroups: - discovery.k8s.io resources: - endpointslices verbs: - get - list - watch - apiGroups: - networking.k8s.io resources: - ingressclasses verbs: - get - list - watch - apiGroups: - traefik.containo.us resources: - middlewares verbs: - get - list - watch - apiGroups: - traefik.io resources: - middlewares - ingressroutes - ingressroutetcps - ingressrouteudps - tlsoptions - tlsstores - serverstransports - traefikservices verbs: - get - list - watch