# services/jenkins/serviceaccount.yaml apiVersion: v1 kind: ServiceAccount metadata: name: jenkins namespace: jenkins --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: jenkins-agent namespace: jenkins rules: - apiGroups: [""] resources: - pods - pods/exec - pods/log - pods/portforward - services - endpoints - persistentvolumeclaims - configmaps - secrets verbs: ["get", "list", "watch", "create", "delete"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: jenkins-agent namespace: jenkins subjects: - kind: ServiceAccount name: jenkins namespace: jenkins roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: jenkins-agent