Kubernetes Service Account and ClusterRoleBinding

For the Kubernetes service account that Commvault requires to perform application discovery, backup, and recovery, you can use an existing service account, or create a new service account. The service account must have a ClusterRoleBinding to either the default cluster-admin (superuser) role or a custom ClusterRole.


Commvault does not support the creation of a restricted ClusterRole that has limited access to namespaces and/or specific API resources.