--authorization-mode=RBAC needs to be added to the kube apiserver.
kubectl create clusterrolebinding add-on-cluster-admin --clusterrole=cluster-admin --user=system:serviceaccount:kube-system:default
kubectl create clusterrolebinding cluster-admin-binding --clusterrole=cluster-admin --user=kube-admin
kubectl create clusterrolebinding 192.168.2.20-node-binding --clusterrole=cluster-admin --user=192.168.2.20
kubectl create clusterrolebinding 192.168.2.21-node-binding --clusterrole=cluster-admin --user=192.168.2.21
kubectl create rolebinding demo-admin-binding --clusterrole=admin --user=demouser --namespace=demo
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: add-on-admin-binding
subjects:
- kind: ServiceAccount
name: default
namespace: kube-system
roleRef:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
name: cluster-admin