diff --git a/content/en/docs/reference/access-authn-authz/rbac.md b/content/en/docs/reference/access-authn-authz/rbac.md index aa5ec669b12..26440edfdb6 100644 --- a/content/en/docs/reference/access-authn-authz/rbac.md +++ b/content/en/docs/reference/access-authn-authz/rbac.md @@ -285,9 +285,13 @@ If you restrict `list` or `watch` by resourceName, clients must include a `metad For example, `kubectl get configmaps --field-selector=metadata.name=my-configmap` {{< /note >}} -Rather than referring to individual `resources` and `verbs` you can use the wildcard `*` symbol to refer to all such objects. -For `nonResourceURLs` you can use the wildcard `*` symbol as a suffix glob match and for `apiGroups` and `resourceNames` an empty set means that everything is allowed. -Here is an example that allows access to perform any current and future action on all current and future resources (note, this is similar to the built-in `cluster-admin` role). +Rather than referring to individual `resources`、`apiGroups`, and `verbs`, +you can use the wildcard `*` symbol to refer to all such objects. +For `nonResourceURLs`, you can use the wildcard `*` as a suffix glob match. +For `resourceNames`, an empty set means that everything is allowed. +Here is an example that allows access to perform any current and future action on +all current and future resources in the `example.com` API group. +This is similar to the built-in `cluster-admin` role. ```yaml apiVersion: rbac.authorization.k8s.io/v1