Kubernetes RBAC Policy Generator

Visually build Roles, ClusterRoles, and Bindings

Anish Nath
Quick Start Presets
Policy Configuration
Metadata
Permissions (Rules)
Subjects (Who)

                                        

                                        
Explain this Policy

Add rules to see a natural language explanation of what this policy allows.

Frequently Asked Questions

Role is namespaced. It grants permissions within a specific namespace (e.g., reading pods in 'dev').
ClusterRole is cluster-wide. It grants permissions across all namespaces (e.g., reading nodes) or can be used as a template for Roles.

Save the generated YAML to a file (e.g., rbac.yaml) and run:
kubectl apply -f rbac.yaml

Support This Free Tool

Every coffee helps keep the servers running. Every book sale funds the next tool I'm dreaming up. You're not just supporting a site — you're helping me build what developers actually need.

500K+ users
200+ tools
100% private
Privacy Guarantee: Private keys you enter or generate are never stored on our servers. All tools are served over HTTPS.