Kubernetes [RBAC]: User with access to specific Pods
Try below way of defining role-binding with resource name as example on docs:
kind: RoleapiVersion: rbac.authorization.k8s.io/v1metadata: namespace: default name: configmap-updaterrules:- apiGroups: [""] resources: ["configmaps"] resourceNames: ["my-configmap"] verbs: ["update", "get"]