RBAC permissions for Kubernetes integration
### Background:
RBAC support has been added for GitLab integrated Kubernetes clusters - to support this, service accounts with high permission levels is created for the cluster.
* `gitlab` ServiceAccount has `cluster-admin`
* `tiller` ServiceAccount has `cluster-admin`
**What questions are you trying to answer?**
This is a discussion issue to gather input about appropriate permission levels for the service accounts that GitLab manages
**Are you looking to verify an existing hypothesis or uncover new issues you should be exploring?**
**What is the backstory of this project and how does it impact the approach?**
**What do you already know about the areas you are exploring?**
The `gitlab` serviceaccount is a replacement for using GKE admin user and password.
**What does success look like at the end of the project?**
The smallest set of privileges is assigned to each managed service account
### Links / references:
* https://docs.gitlab.com/ee/user/project/clusters/index.html#role-based-access-control-rbac
* https://gitlab.com/gitlab-org/gitlab-ce/issues/29398
issue